article thumbnail

Black Hat Fireside Chat: Easy come, easy go access strengthens ‘Identity Threat Detection & Response’

The Last Watchdog

The rise of the remote workforce, post Covid-19, did nothing to make the already difficult task of doing Identity and Access Management ( IAM ) any easier for CISOs. Companies today are struggling to answer fundamental questions about their cloud environments, such as, who are my users and what can they access?

article thumbnail

6 top attributes employers want in new CISOs

CSO Magazine

Looking for your next position as a CISO, preferably one with more pay, better benefits, and more on-the-job responsibilities/respect? Then you need to know what skills and qualities prospective employers are seeking now from their CISO hires to maximize your chances of getting your dream job. Previous CISO experience (probably).

CISO 121
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unmasking the Cracks of Today’s Cyber Defence

Jane Frankland

In this blog, I’ll be exploring some of the main cracks in current cybersecurity defence approaches specifically around Secure Operation Centres (SOCs) and the value that CISOs and ITDMs are currently getting from their internal teams and third-party providers. This is unsurprising considering today’s challenging business landscape.

CISO 147
article thumbnail

Cloud Security Podcast by Google?—?Popular Episodes by Topic

Anton on Security

Top 5 overall “Confidentially Speaking“ “Data Security in the Cloud“ “Zero Trust: Fast Forward from 2010 to 2021“ “The Mysteries of Detection Engineering: Revealed! “ “Modern Threat Detection at Google“ Security Operations Center (SOC) “SOC in a Large, Complex and Evolving Organization” “EP58 SOC is Not Dead: How to Grow and Develop Your SOC for Cloud” (..)

article thumbnail

CISOs: How to improve cybersecurity in an ever-changing threat landscape

CyberSecurity Insiders

Everybody within an organization should work to establish and maintain good cybersecurity habits and measures, but much of the security burden falls on the chief information security officer (CISO). Below are some key insights for any CISO to take into consideration.

CISO 105
article thumbnail

Is fighting cybercrime a losing battle for today’s CISO?

CyberSecurity Insiders

In this blog, we’ll look at the root causes of concern for today's CISO and share some practical strategies to deter cybercriminals. The CISO role can be an unenviable one. Is the cyber deck stacked against today's CISO? As CISO, you are usually accountable for the security of the application fleet.

CISO 126
article thumbnail

XDR is coming: 5 steps CISOs should take today

CSO Magazine

According to ESG research on The Impact of XDR in the Modern SOC , improving detection of advanced cyberthreats is the highest priority for enterprise security operations, with 83% of organizations planning to increase threat detection and response spending over the next 12 to 18 months.

CISO 121