article thumbnail

How to Become a CISO in 5 Steps

CyberSecurity Insiders

If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. Becoming a CISO is not something you’re going to be able to do right away. It is not possible to get a CISO status unless you have extensive field experience.

CISO 112
article thumbnail

These Roles Require Cybersecurity Training

CyberSecurity Insiders

Watch the (ISC)² webinar Protecting the Enterprise: 5 Components needed for Cybersecurity Training to get insights into who needs cybersecurity training and much more. Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO. Compliance Officer.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Meet The Team Behind Mayhem: Come See Us At These Upcoming May 2023 Events

ForAllSecure

We participated in B Sides last month, hosted a webinar on “How to Increase Test Coverage With Mayhem for API”, and hosted a university hackathon at UC Santa Cruz. Join the Mayhem team in our upcoming webinar to learn how to identify and address vulnerabilities in open-source libraries. When : May 24, 10 a.m. PT / 1 p.m.

article thumbnail

Passkeys vs. Passwords: The State of Passkeys on Cloud Sites

Duo's Security Blog

So for many IT teams, the news that tech giants are steadily embracing passkey technology is exciting. We’ve been answering these questions in this blog series by unpacking the pros and cons of passkey technology from different authentication perspectives. Nobody likes passwords. But how effective are passkeys really?

article thumbnail

Challenges and Opportunities of the Cyber Liability Insurance Market

Duo's Security Blog

As an advisory CISO and part of Cisco’s strategy group, an essential part of my role is talking to CISOs from every kind of organization. As well as talking to CISOs, I also believe it is crucial to get perspectives from all sides. As well as talking to CISOs, I also believe it is crucial to get perspectives from all sides.

article thumbnail

Choosing an MDR Provider: Boutique or Big Brand (Part 2)

Jane Frankland

I began by discussing the first core feature – technology – I believe you should consider, along with the benefits and potential drawbacks. When e2e-assure, a TDR provider surveyed ITDMs and CISOs in the UK market, they found that 37% of buyers expressed frustration with this standard practice. Register here – [link]

Marketing 130
article thumbnail

The Bridge to Zero Trust

CyberSecurity Insiders

John Masserini, of Tag Cyber, will explore practical approaches to advancing zero trust along with his fellow panelists: Kevin Dana, VP of Information Technology for World Wide Technology; Marcos Christodonte II, Global CISO for CDW; and Allen Jeter, Director of IT for Chainalysis.