CSO and CISO
CSO and CISO | News, how-tos, features, reviews, and videos
Sponsor Podcast in partnership with Microsoft
Episode 4: Reduce SOC burnout
Sponsor Podcast in partnership with Microsoft
Episode 3: The Zero Trust Model
Episode 3: In this episode, we look at the steps organizations are taking toward Zero Trust and provide recommendations for making the most of a Zero Trust model to reduce risk while helping employees be more productive, regardless...
5 questions CISOs should be able to answer about software supply chain attacks
The SolarWinds attack put a spotlight on the threats that compromised third-party software present organizations. Here are the top questions executive management, boards and partners are asking CISOs about their preparedness.
8 new roles today’s security team needs
Demand for cybersecurity professionals remains sky-high. Make sure you're hiring for the right roles.
4 ways to keep the cybersecurity conversation going after the crisis has passed
Executives and board members focus more on cybersecurity when there’s immediate danger. Here’s how CISOs can use a crisis like SolarWinds to translate security into business strategy.
CISO job search: What to look (and look out) for
Sometimes a CISO isn't really a CISO, or the role does not have the authority or resources it needs. Here's how those seeking CISO roles can avoid the wrong employer.
video
Business continuity during COVID-19: How CISOs and CIOs work together
Sarah Winmill, CIO - Business Functions, at the UK Ministry of Defence, and Quentyn Taylor, Director of Information Security at Canon EMEA, discuss work collaboration during the pandemic.
video
CIO-CISO Collaboration: How to Prioritise IT and Security Budgets
In this webinar, Davide Del Vecchio, CISO at a UK sports and entertainment technology provider, and Chris Adjei-Ampofo, CIO at Uphold Inc, discuss how CISOs and CIOs can collaborate in a time when budgets might be constrained.
Podcast CSO Executive Sessions
Episode 8: Healthcare security in a time of crisis
Podcast Episode 8: Listen now as Gary Gooden, CISO at Seattle Children’s, joins host Bob Bragdon to discuss the impact of COVID-19 on security at the healthcare organization.
Podcast CSO Executive Sessions
Episode 6: Building security in
Podcast Episode 6: Listen now as Mike Towers, CSO at Takeda Pharmaceuticals International, discusses getting to a place where it is easy for the business to do the secure thing.
10 tough security interview questions, and how to answer them
Recently hired security leaders share what hiring execs want to know in interviews.
Insider risk management – who’s the boss?
Where the buck should stop…why and why not.
3 keys to preserving customer relationships in the wake of a data breach
To thrive after a data breach, try talking to your customers during one.
Attention cybersecurity entrepreneurs: CISOs want simplicity!
The cybersecurity market has matured from reactive to proactive cybersecurity technology integration. Top CISOs and industry experts weigh in on how new entrants into the cybersecurity marketplace can shape their value propositions to...
Staffing the CISO office: A call to senior management for some expansive thinking
More companies need to realize that an inherent staffing misalignment around their CISO role presents potentially critical exposure to the organization.
Tech Primer
What it takes to become an information assurance analyst
This in-demand role calls for a rare combination of superior communication skills and security chops. Learn how one information assurance analyst landed his current job, the skills and training that helped him get there, and where his...
Tech Primer
Fraud prevention: Improving internal controls
Internal fraud controls aren't fire-and-forget. Smart collaboration and ongoing improvement will help keep fraud in check. Here are the basics.
Tech Primer
What it takes to become an IT security engineer
The role is a fairly new one in many companies, and qualified candidates are in high demand. Learn how one IT security engineer landed his current job, the skills and training that helped him get there, and where his sights are set...
Tech Primer
How to write an information security policy
Learn the critical first step, why consensus is key, what to cover and how make your information security policy — and program — effective.
-
Analyst Report
Sponsored -
Video/Webcast
Sponsored -
Video/Webcast
Sponsored -
White Paper
-
White Paper