CSO and CISO

CSO and CISO | News, how-tos, features, reviews, and videos

podcast 3x16 2
Sponsor Podcast Microsoft

Episode 4: Reduce SOC burnout

businessman on a rock in a stormy ocean

podcast 3x16 2
Sponsor Podcast Microsoft

Episode 3: The Zero Trust Model

Episode 3: In this episode, we look at the steps organizations are taking toward Zero Trust and provide recommendations for making the most of a Zero Trust model to reduce risk while helping employees be more productive, regardless...

backdoor / abstract security circuits, locks and data blocks

5 questions CISOs should be able to answer about software supply chain attacks

The SolarWinds attack put a spotlight on the threats that compromised third-party software present organizations. Here are the top questions executive management, boards and partners are asking CISOs about their preparedness.

Aspects of employment / communication / networking / partnership / collaboration / teams / hiring

8 new roles today’s security team needs

Demand for cybersecurity professionals remains sky-high. Make sure you're hiring for the right roles.

Tech Spotlight   >   Cybersecurity [CSO]   >   Hands gesture in conversation

4 ways to keep the cybersecurity conversation going after the crisis has passed

Executives and board members focus more on cybersecurity when there’s immediate danger. Here’s how CISOs can use a crisis like SolarWinds to translate security into business strategy.

magnifying glass office chair employment career job search recruiter

CISO job search: What to look (and look out) for

Sometimes a CISO isn't really a CISO, or the role does not have the authority or resources it needs. Here's how those seeking CISO roles can avoid the wrong employer.

Webinar screenshot
video

Business continuity during COVID-19: How CISOs and CIOs work together

Sarah Winmill, CIO - Business Functions, at the UK Ministry of Defence, and Quentyn Taylor, Director of Information Security at Canon EMEA, discuss work collaboration during the pandemic.

CIO-CISO Collaboration webinars
video

CIO-CISO Collaboration: How to Prioritise IT and Security Budgets

In this webinar, Davide Del Vecchio, CISO at a UK sports and entertainment technology provider, and Chris Adjei-Ampofo, CIO at Uphold Inc, discuss how CISOs and CIOs can collaborate in a time when budgets might be constrained.

cso exectutive sessions 3000px x 3000px

Episode 8: Healthcare security in a time of crisis

Podcast Episode 8: Listen now as Gary Gooden, CISO at Seattle Children’s, joins host Bob Bragdon to discuss the impact of COVID-19 on security at the healthcare organization.

CSO Executive Sessions [podcast logo]

Episode 6: Building security in

Podcast Episode 6: Listen now as Mike Towers, CSO at Takeda Pharmaceuticals International, discusses getting to a place where it is easy for the business to do the secure thing.

A businessman walks through a keyhole-shaped doorway into field of question marks.

10 tough security interview questions, and how to answer them

Recently hired security leaders share what hiring execs want to know in interviews.

staring at the boss

Insider risk management – who’s the boss?

Where the buck should stop…why and why not.

cso siem visibility gap in security apps legacy eyes crack breach privacy

3 keys to preserving customer relationships in the wake of a data breach

To thrive after a data breach, try talking to your customers during one.

easy simple pixel hand computer pointer

Attention cybersecurity entrepreneurs: CISOs want simplicity!

The cybersecurity market has matured from reactive to proactive cybersecurity technology integration. Top CISOs and industry experts weigh in on how new entrants into the cybersecurity marketplace can shape their value propositions to...

Conceptual image of a network of executives / silhouettes of executives in motion.

Staffing the CISO office: A call to senior management for some expansive thinking

More companies need to realize that an inherent staffing misalignment around their CISO role presents potentially critical exposure to the organization.

What it takes to become an information assurance analyst

This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...

Fraud prevention: Improving internal controls

Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.

What it takes to become an IT security engineer

The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...

information security 2

How to write an information security policy

Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.

Load More
You Might Also Like