article thumbnail

GUEST ESSAY: The key differences between ‘information privacy’ vs. ‘information security’

The Last Watchdog

Information privacy and information security are two different things. Related: Tapping hidden pools of security talent Information privacy is the ability to control who (or what) can view or access information that is collected about you or your customers.

article thumbnail

Build Strong Information Security Policy: Template & Examples

Security Boulevard

One of the best and most important measures you can take to protect your data (and that of your customers) is simply to have a robust information security policy. The post Build Strong Information Security Policy: Template & Examples appeared first on Hyperproof. Of course, that idea sounds simple enough.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key Considerations When Hiring a Chief Information Security Officer

CyberSecurity Insiders

In today’s interconnected world, where cyber threats loom large, organizations must prioritize information security. One crucial step towards achieving robust cybersecurity is hiring a competent Chief Information Security Officer (CISO).

article thumbnail

How to Succeed As a New Chief Information Security Officer (CISO)

IT Security Guru

As cyber threats increase in frequency and complexity, organizations recognize the importance of having a Chief Information Security Officer (CISO) to protect their sensitive data and infrastructure. Having a clear idea of your challenges and working with a coach can help your CISO first 90 days and adjust more smoothly.

CISO 86
article thumbnail

Fake CISO Profiles on LinkedIn Target Fortune 500s

Krebs on Security

Someone has recently created a large number of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. It’s not clear who’s behind this network of fake CISOs or what their intentions may be. Of course, Sites is not the real CISO of Chevron.

CISO 313
article thumbnail

A CISO game plan for cloud security

InfoWorld on Security

As businesses increasingly migrate to the cloud, chief information security officers (CISOs) face numerous critical challenges in ensuring robust cloud security. Experts highlighted this at the recent Gartner Security & Risk Management Summit. Don’t believe me? To read this article in full, please click here

CISO 72
article thumbnail

Former Uber CISO Faces Prison Time For Mishandling Cyberattack: Justice, Scapegoating, or Both?

Joseph Steinberg

attorney for the Northern District of California, said in a statement: “We will not tolerate concealment of important information from the public by corporate executives more interested in protecting their reputation and that of their employers than in protecting users. Serving as a Chief Information Security Officer is a daunting task.

CISO 251