Joan Goodchild

Editor-in-Chief

Joan Goodchild, former editor in chief of CSO, is a veteran editor and writer with 20+ years experience. She has a Master's degree from Northwestern University's Medill School of Journalism and received an Edward R. Murrow award for investigative journalism.

How to prepare for a data breach

How to prepare for a data breach

Tips and tricks for preparing a data breach response plan

How CSOs can better manage third-party risks

How CSOs can better manage third-party risks

Scott Schneider from CyberGRX chats with CSO about how security managers can secure their data when dealing with third-party vendors.

What CSOs can learn from the Yahoo data breach

What CSOs can learn from the Yahoo data breach

Kevin O’Brien from GreatHorn chats with CSO about the takeaways for security leaders

Why your employees are still a huge security risk

Why your employees are still a huge security risk

Michael Bruemmer from Experian Data Breach Resolution joins CSO to chat about companies not being tough enough on employees who break security protocols.

Why you need tiered security training for IT staff

Why you need tiered security training for IT staff

What's the difference in training for IT staff members and the IT security team?

How can we improve awareness training?

How can we improve awareness training?

Bill Rosenthal from Logical Operations chats with CSO about the failings of end user security training, and where security managers can look to make improvements

Generational differences in security, privacy attitudes

Generational differences in security, privacy attitudes

How does being a Millennial, a Boomer or a Gen X-er impact your attitude toward security and safety? Ted Harrington from Independent Security Evaluators chats with CSO about generational attitudes toward security and privacy.

Security Sessions: Protecting data when it’s increasingly mobile

Security Sessions: Protecting data when it’s increasingly mobile

Brett Hansen from Dell Security Solutions joins CSO to discuss data protection when employees and business partners are increasingly mobile

Cloud security in 2016: Trust, global concerns and looming IoT issues

Cloud security in 2016: Trust, global concerns and looming IoT issues

Jim Reavis from the Cloud Security Alliance joins CSO to discuss whether enterprises are finally trusting the cloud to protect their data.

Are hospital security standards putting patient safety at risk?

Are hospital security standards putting patient safety at risk?

Ted Harrington from Independent Security Evaluators joins CSO to discuss how hospitals are more vulnerable in protecting patient health than patient data.

Privacy, risk and trolls: Dealing with the security challenges of YouTube fame

Privacy, risk and trolls: Dealing with the security challenges of YouTube fame

It seems a new YouTube star is born every day lately with thousands now making money and pursuing full-time careers in online video. But the popularity that comes with millions of viewers is not without its privacy challenges

How CSOs can reduce security alert fatigue

How CSOs can reduce security alert fatigue

Eran Barak from Hexadite joins CSO to discuss the rise of security alert fatigue among security staffers, and how CSOs can avoid the ‘Boy Who Cried Wolf’ scenario at their companies.

All credentials are NOT created equal

All credentials are NOT created equal

John Worrall from CyberArk joins CSO to discuss the rising theft of company credentials (usernames, passwords) and how hackers are going for the Holy Grail of credentials - privileged account access - to gain access to corporate...

Unique security challenges facing healthcare IT

Unique security challenges facing healthcare IT

Ellen Derrico of RES joins CSO to discuss the demands and challenges healthcare IT faces in security - particularly when it comes to ransomware. When life or death is on the line, what are industry leaders are doing to respond when...

Moving from tech expert to business leader

Moving from tech expert to business leader

You've been focused on technology and security for years, but now you're ready to move into a business leader role. Where do you start? What skills do you need? Lorna Koppel, Director of Information Security for Tufts University,...

Tips and tricks for building a great security team

Tips and tricks for building a great security team

Creating an effective security program in your organization starts with staffing a team of innovative and smart people to support the security mission. In our first edition of Security Sessions, Josh Feinblum of Rapid7 shares his...

How do you break into a private network? All it takes is a free dinner

How do you break into a private network? All it takes is a free dinner

David Spark asked conference attendees at RSA 2016 how to access their network. What's the secret? The answers might surprise you

Yahoo! names Bob Lord new CISO

Yahoo! names Bob Lord new CISO

Yahoo! announced Monday that Bob Lord has joined the Internet company as CISO.

Red Bull scam will give your bank account wings

Red Bull scam will give your bank account wings

A scam email making the rounds offers to pay you to drive a Red Bull-decal adorned car. Sounds too good to be true? That's because it is

Professional hackers talk social engineering threats and security awareness
Q&A

Professional hackers talk social engineering threats and security awareness

With years of experience pen testing and human hacking, Chris Hadnagy and Dave Kennedy are experts at how social engineers work, and what techniques they use to successfully breach an organization. In this discussion with CSO Chief...

Load More