

Bob Bragdon
Publisher


Episode 2: Three things that keep Biogen CISO Bob Litterer up at night
Podcast Episode 2: Listen now as Bob Litterer, VP and CISO of biotech giant Biogen, talks about the interdependencies in his company’s third-party network -- and how a data breach anywhere in that ecosystem could have a devastating...

Introducing ‘CSO Executive Sessions’
Join CSO publisher Bob Bragdon for a new audio podcast series, CSO Executive Sessions, which will feature conversations with leading security and risk executives from around the country about the challenges faced by their...

Don’t let social media get you in trouble
As social media has become more pervasive, it has run headlong into the inevitable intersection between our personal lives and our work lives. How to best manage that intersection is something everyone should understand.
The Hidden Costs of “Business as Usual”
A new survey by Ponemon and ServiceNow of nearly 3,000 cybersecurity professionals reveals that in the past 2 years, 48% of companies have experienced a data breach. Clearly companies can’t afford to forge blindly ahead, doing the...

Remember: It’s not all about the 1s and 0s
Don't forget the role of physical security in protecting your assets...even the digital ones.
Up-Close Look at Threat Response in 2 Industries
A new global survey by Ponemon and ServiceNow of nearly 3,000 cybersecurity professionals reveals that more than half the companies have experienced a breach in the past year. In this session Bob Bragdon, Senior Vice President and...
The Patching Paradox
A new global survey by Ponemon and ServiceNow of nearly 3,000 cybersecurity professionals reveals that more than half the companies have experienced a breach in the past year. In this session Bob Bragdon, Senior Vice President and...
The Answer to Cyber Threats: People or Technology?
A new global survey by Ponemon and ServiceNow of nearly 3,000 cybersecurity professionals reveals that more than half the companies have experienced a breach in the past year. Compounding this issue: the volume of cyberattacks...
Know the Facts – Today’s Cyberthreat Landscape
The facts are undeniable: A new global survey by Ponemon and ServiceNow of nearly 3,000 cybersecurity professionals reveals that more than half the companies have experienced a breach in the past year. In this session Bob Bragdon,...

The rolling tide that is GDPR … say hello to the CCPA
Think you dodged the GDPR bullet because you’re not in Europe? Guess again. California just brought that home for millions of businesses.

The story of Mary
Good information security isn't just about the 1s and 0s.

IP theft doesn’t always come from overseas
With all the discussion about ransomware extortion, data breaches like Equifax, and privacy violations in social media, one of the greatest threats to any business can get lost in the noise — the theft of their intellectual property...

Moving to fast fail
Managing security for today’s enterprises is an increasingly complex task. But being comfortable with failure is an important skill.

The hidden (and not so hidden) costs of a ransomware attack
Most businesses would prefer to bury the costs associated with their response to a data security event. That's not always an option.

Where we’ve been. Where we’re going.
As we wind down 2015 I think it’s a good time to throw my two cents into the morass of all the other “end of year recaps” and “next year predictions”. This is what I observed and what I think we’ll see in the future.

IMHO: Security can never be just part of the business
Security has gone from afterthought to priority in the Board's eyes. That's a good thing, right? But it brings with it a new kind of risk – when security is viewed as simply part of business as usual

A View of the World from Your Office
As you gaze out the window of your office, ever wonder if someone is looking back?
Maybe it really does matter who the CISO reports to
Does it really matter if the CISO reports to someone other than the CIO
When leadership gets on board
Why has the Board of Directors suddenly gotten on board with the importance of cybersecurity. For years, security was a four-letter word that meant ‘spend lots of money and get nothing in return’. Suddenly this seemed to be changing....
-
White Paper
-
Sponsor Article
Sponsored -
Video/Webcast
Sponsored -
White Paper
-
White Paper