George Viegas

Opinions expressed by ICN authors are their own.

George Viegas is an information security professional providing management-level leadership, guidance and value in the planning and delivery of global information security strategies, initiatives, solutions and services.

His information security background spans various verticals including banking, financial services, media and entertainment in U.S. and global business environments.

The opinions expressed in this blog are those of George Viegas and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.


 How to build a top-notch vulnerability management program

How to build a top-notch vulnerability management program

The vulnerability management program can be elevated from good to great by close and tight integration with several key associated systems

10 reasons for CSOs to be thankful

10 reasons for CSOs to be thankful

The attack surface continues to expand and has made the job of the CSO increasingly complex and challenging. It’s not just technology alone anymore but increasingly it takes the village to secure the enterprise.

Holiday messaging tips for the security team

Holiday messaging tips for the security team

Early November is a good time to lean-in on security messaging from the security team. Rebrand and re-message your October Cybersecurity month content into November pre-holiday messaging or put together new messaging. Also do not...

October is Cybersecurity Awareness Month

October is Cybersecurity Awareness Month

There are many things that you can do in October to leverage cybersecurity month for information security messaging in your organization

The incident response plan you never knew you had

The incident response plan you never knew you had

By leveraging important elements of the existing business continuity plan (BCP) and resources, the security team can jump start the computer incident response plan (CIRP) and obtain a faster and more responsive organization.

10 steps to managing a successful network penetration test

10 steps to managing a successful network penetration test

Much has been written about various tools and technical methods for running network penetration tests or pen tests. However running an effective and successful pen test requires some amount of technical management skills, effort and...

The paranoid CISO

The paranoid CISO

Just because there is no noise on our security sensors does not mean we are not under attack. Enter the ever-vigilant and paranoid CISO.

CSO 2.0: How to take your security program to the next level

Security is all about the big picture now. Here are some pointers from George Viegas on how the "CSO 2.0" can take a more effective approach to security in 2014 and the future

4 key elements for proactive application security

Patching vulnerabilities AFTER the exploit is only one piece of the picture. Here are four tips from George Viegas to build in a proactive software security posture

10 security tips for customer support and service

Tips for security organizations to implement for their support and services delivery teams

Too many CSOs ignore the reality of today's threats

George Viegas argues that recent research, like Mandiant's APT1 report, finds too many security managers suffer from "ain't gonna happen to me" syndrome and fail to protect their business because of it. Do you have it?

Load More