Remove CSO Remove Risk Remove Security Awareness Remove Technology
article thumbnail

Cyber Security Awareness and Risk Management

Spinone

In this article we will learn how to address and effectively respond to major enterprise cybersecurity threats and provide tips to mitigate IT security risk. Today, c yber security incidents lead to significant damage, alarming organizations of all types and sizes in different geographic locations.

article thumbnail

A Chief Security Concern for Executive Teams

Krebs on Security

Even among top tech firms, less than half list a chief technology officer (CTO). KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO).

CSO 222
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: Tackling Security in the World of Containers, Hybrid Cloud, and DevSecOps

CSO Magazine

More organizations are transforming their businesses by embracing DevOps principles, microservice design patterns, and container technologies such as Docker and Kubernetes. These increasingly popular technologies can help organizations improve processes such as configuration management, patch management, compliance, and governance.

article thumbnail

CISO’s Guide to Presenting Cybersecurity to Board Directors

CyberSecurity Insiders

Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. One key aspect of successful communication is understanding the business objectives and risk appetite of the organization.

article thumbnail

People Skills Outweigh Technical Prowess in the Best Security Leaders

SecureWorld News

A recent blog by Frank Domizio titled " The CISO Role: Beyond Technology " explores exactly what I am talking about. But it is vital as they fight for cybersecurity budget, try to explain risk, and explain the importance of line items such as security awareness training, blue, red and purple team exercises, and more.

CISO 105
article thumbnail

How to build a zero trust ecosystem

SC Magazine

Humans are often the weakest link in security practices, falling victim to phishing attacks or lack of security awareness. Transforming your technology infrastructure can be long, tedious work, and you will operate in a hybrid Zero Trust/legacy mode for a time. James Carder, LogRhythm CSO.

CISO 134
article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert.