article thumbnail

CISO workshop slides

Notice Bored

A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 63
article thumbnail

Security pros rely on peer groups and open communication for help with stress

SC Magazine

This nonstop barrage of security crises has made certain infosec leaders and practitioners more aware than ever of the job’s impact on mental healthy, and the importance to protect against stress, exhaustion and burnout. Corll said he closely interacts with about 20 other CISOs through the U.S.-based But how have they been managing?

InfoSec 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The discomfort zone

Notice Bored

This is bewildering, scary stuff, especially for relatively inexperienced infosec or cybersecurity professionals who seldom set foot outside of the IT domain. At the CISO, Information Security Manager or Privacy Officer level, the view is no less scary despite narrower knowledge gaps. Documented! Maintained! Good luck with that.

Risk 72
article thumbnail

Confessions of an InfoSec Burnout

The Falcon's View

The fact is that they'd hired a new General Counsel who also claimed a security background (he had a CISSP), and thus they made him the CISO. It was also the week before Labor Day, which at the time meant it was teacher workshops, and I was on the road for it with 2 young kids at home. 6 months later they eliminated the position.

InfoSec 45
article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Respect the user’s privacy and productivity by anonymizing location data and eliminating unnecessary decisions when continually verifying trust. .” – Jason Waits, Chief Information Security Officer (CISO), Inductive Automation Ready to start charting your zero trust program? Or, download our white paper How to go from MFA to Zero Trust.

article thumbnail

Democratizing Threat Hunting: How to Make it Happen for Everyone

Cisco Security

As Wendy Nather , Head of Advisory CISOs, Duo Security at Cisco so eloquently puts it at the beginning of the report, “This is not a marketing report to toss in your swag bag and ignore; this is a report to cuddle up with and read over and over again. In fact, this report will change how we think about running infosec programs.”.

Risk 103