How to prepare for the next cybersecurity attack

How to prepare for the next cybersecurity attack

How should security management ready their organizations?

03/07/2018

Managing threat information and intelligence

Managing threat information and intelligence

The last thing that any organization wants is to make the headlines following a security breach. The damage to their reputation can be enormous, as can the financial costs. Unfortunately, it’s not a case of if it will happen, but when...

01/17/2018

Vetting third-party IT security partners

Vetting third-party IT security partners

In the last installment of this blog series, “Report from the Field – CISO’s Top Concerns,” we discuss the benefits and risks of using third-party service suppliers.

01/03/2018

Sophistication of cyberthreats – combination of independent hacker organizations and state actors

Sophistication of cyberthreats – combination of independent hacker organizations and state actors

In the same way network security tools are developed and released, cyber criminals can pick up a wide inventory of tools that can make it easy for those who don’t have a technical background to launch a cyberattack.

11/28/2017

Dealing with a shortage of information security and IT skill sets

Dealing with a shortage of information security and IT skill sets

There is no question that there is a shortage of data security, information security, and cybersecurity skill sets across the globe.

11/07/2017

Supporting business transformations – mergers and acquisitions

Supporting business transformations – mergers and acquisitions

Often, a CISO and security is not part of the planning process for a merger or acquisition. In the fast pace of executing a business deal, security details and priorities can be overlooked.

10/23/2017

Aligning security with changing business strategy, goals and objectives

Aligning security with changing business strategy, goals and objectives

Chief Information Security Officers (CISOs) need to align security concerns to the enterprise’s changing business strategy, goals and objectives.

10/12/2017

Will GDPR protect individuals’ privacy or lead to more hacks?

Will GDPR protect individuals’ privacy or lead to more hacks?

Is it coincidence that the GDPR will have the greatest effect on non-EU companies that use data in the ways described above? The answer is no.

08/30/2017

Chances are good ... that you’re already infected

Chances are good ... that you’re already infected

Businesses in certain industries need to accept the fact that they are high-priority targets...and may have already been breached.

07/11/2017

Load More