IT Leadership

IT leadership and management news, analysis, research, how-to, opinion, and video.

feedback / survey / questionnaire
techy connected cloud

europe data privacy rules primary2

Hacking the GDPR

Using anonymization and pseudonymization to reduce the overhead of GDPR compliance.

us eu flag

GDPR: Do you provide goods or services in the EU?

The General Data Protection Regulation applies to all organizations that provide goods and services to people in the EU. The risk of not complying may result in fines up to 4% of your organization’s global revenues.

insurance cyber attack protection

Five things you need to know about executive protection

Executive protection requires risk assessment and adherence to rules. Here's how you get executive buy-in.

Artificial intelligence and digital identity

The ABCs of Identity Management

Identity management tools provide IT managers with tools and technologies for controlling user access to critical information within an organization.

NAIC Summer 2017 Cybersecurity Working Group

Mandating privacy safeguards for the insurance sector

Insurance applications – privacy requirements ahead.

iot internet of things strategy city enterprise

Security leaders: Prepare now for the convergence of IT, OT and IoT

Adi Dar, CEO of Cyberbit, talks about what happens when IT, OT and IoT combine and how security leaders need to prepare.

security analytics

How to improve security analytics and operations

Many organizations struggle with processes, tools and the working relationship between security and IT operations teams.

we're hiring sign jobs careers public domain

Cybersecurity headhunter shares 10 secrets from Black Hat 2017

A security industry job recruiter goes undercover at the Black Hat 2017 Conference, and lives to tell about it. Here are 10 things he learned.

maze / goal

It’s time for security leaders to challenge dogma

Jason Brvenik for a Security Slap Shot on the need for security leaders to challenge dogma and replace outsized assumptions with evidence and better action.

6 regulations

GDPR – What security pros need to know about the new era of privacy regulations

Many security professionals no doubt have heard of the new European Union (EU) omnibus data protection regulation called GDPR. GDPR, which stands for the EU General Data Protection Regulation, is in many ways a landmark regulation...

disaster recovery plan ts

GDPR – how to make your DR compliant

With GDPR coming into effect on 25 May 2018, it's costing businesses significant time and money to ensure compliance with the new regulations. Rather this than risk a fine of 4% of turnover or €20million. But when it comes to your...

hacking critical infrastructure security

Choose preparation over fear to protect critical infrastructure

Patrick Dennis lines up for a Security Slap Shot on the need to stop using FUD and start making better preparations to protect critical infrastructure.


CIO Career Coach: Be a good storyteller

Stories are the most powerful communication devices available. Tell better stories, and you’ll become a better CIO.

red team vs. blue team

Red team versus blue team: How to run an effective simulation

Playing the role of an attacker can make your team better at defense. Learn how in our step-by-step guide to war gaming your security infrastructure — from involving the right people to weighing a hypothetical vs. live event.

The modern guide to staying safe online

5 reasons to take a fresh look your security policy

Evolving ransomware and DDoS attacks, new technology such as IoT, and changing user behavior are all good reasons to revise your security policy.

ipad at the beach

Great big list of cybersecurity resources

Beef up your cybersecurity knowledge with this list of cybersecurity resources, including data threats, data breaches, books, jobs, companies and VC funding.

negotiating contracts ts

Know the 'real' price of vendor contracts

Although many vendor engagements result in close working relationships, the age of predatory vendors is upon us. What can you do to avoid them?

phishing threat

Top 10 phishing email subject lines that launch ransomware

Give this list of top 10 most-clicked phishing email subject lines to your employees, then go phish yourself.

Load More