article thumbnail

How CyberSecurity Technology Companies Can Stand Out In A Crowded Field

Joseph Steinberg

Throughout their conversation, the two business leaders discussed both the state of the cybersecurity space, as well as how cybersecurity technology companies can stand out in a crowded market. To listen to the interview, please visit the following page: How To Stand Out In Cyber With Joseph Steinberg.

article thumbnail

LinkedIn being targeted by fake CISO Profile Positions in Large Companies

CyberSecurity Insiders

LinkedIn has publicly announced that for some reasons, its servers are being targeted by fake CISO Profiles that disclose vacant positions at large multinational companies. Krebs On Security received this update from the professional social media giant and initiated an inquiry along with the public disclosure.

CISO 133
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How CISOs Can Impact Security for All

Cisco Security

Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.

CISO 89
article thumbnail

Uber CISO's trial underscores the importance of truth, transparency, and trust

CSO Magazine

Truth, transparency and trust are the three T’s that all CISOs and CSOs should embrace as they march through their daily grind of keeping their enterprise and the data safe and secure. Failure to adhere to the three T’s can have serious consequences.

CISO 107
article thumbnail

As a CISO, Are You a Builder, Fixer, or Scale Operator?

Lenny Zeltser

One approach to understanding and explaining this is to consider whether, as a CISO, you are a Builder, Fixer, or Scale Operator. Helen Patton helps CISOs understand how they should spend their time by discussing seven circles of security : Technology, data, business, etc. Which kind of CISO are you at this point in time?

CISO 66
article thumbnail

New CISOs should focus more on people and less on tech, report finds

SC Magazine

Other major companies to recently install a new CISO include Uber and Square. Two major themes emerged from the research and interviews conducted with CISOs. The first is that developing human connections is more critical to a CISO’s early success than mastery of the technical details. Twitter headquarters.

CISO 99
article thumbnail

Stop betting on detection-based security technology

SC Magazine

Today’s columnist, Aviv Grafi of Votiro, says companies need stronger, more proactive tools, and must give CISOs a seat at the table –or else we’ll have more major attacks like the ones on SolarWinds, Microsoft Exchange, Colonial Pipeline, and now Kaseya. ecooper99 CreativeCommons CC BY 2.0. Guess what? They’re not.