IT Leadership

IT Leadership | News, how-tos, features, reviews, and videos

nasrin rezai general electric

CSO Spotlight: Nasrin Rexai, General Electric

The first female CISO at GE, Nasrin Rexai, stresses how important it is to know who you are, to lead according to your value system, and to think before your respond.

template c100.00 00 08 04.still001
video

How to pick the best project management methodology for success

Choosing the right project management methodology for the job is essential. Our guide to evaluating project management methodologies will ensure you pick the perfect fit for your next project.

CSO Spotlight Q&A > Tracy Reinhold, Everbridge

CSO Spotlight: Tracy Reinhold, Everbridge

How a successful career in the FBI along with the events of 9/11 put Tracy Reinhold on the path to a career in cybersecurity.

executive superimposed on buildings leadership

What makes CISOs successful?

Leadership and communication skills top the list of what's needed to succeed as a chief information security officer (CISO), while technical skills aren’t nearly as important.

multi tasking running executive race speed internet mobile laptop

Hack like a CISO

Developing the security officers' processes, strategies and techniques for managing their time, resources and teams.

eye binary IDS Intrusion Detection System

Cybersecurity operations: Don't wait for the alert

An SOC is a useful part of our cybersecurity arsenal, but its main benefit will be in helping to minimize damage from an issue that has already happened. A strong investigative team, on the other hand, can help to identify and resolve...

justin berman zenefits

CSO Spotlight: Justin Berman, Zenefits

Being wrong is good, embrace it, learn from it and grow from it, advises Berman. Being an effective security leader is about recognizing that "your job is to get the best answer, not to have it."

service management

IT service management: security’s best friend

Your IT service management (ITSM) teams can serve up good security practices with your help.

david smith nuix

CSO Spotlight: David Smith, Nuix

Winning the war against cybercrime is getting closer to reality as law enforcement dedicates more resources to cybersecurity investigations and improves cyber-related laws.

5 fumbling dumb mistake

The ostrich security strategy is now very risky

Ignorance of a serious security event is unreasonable, and just like ignorance of the law, it is no defense.

annalea llg flexential

CSO Spotlight: Annalea Ilg, Flexential

The cybersecurity threat is ever growing and its clear companies are still not following basic security practices. If they were, we wouldn’t be seeing so many breach notifications, says Ilg.

board ceo executives table

Top reasons CEOs should care about privacy

Privacy protection will undoubtedly be one of the defining issues of the internet age, and it’s important for leaders and companies to take notice and actively prevent breaches and protect their customers.

Lego wall breakthrough

Does DevSecOps eliminate the segregation of duties between security and DevOps?

Yes, some cloud-native application development tools include basic security features. No, that does not mean DevOps should “own” security.

sequence 01.01 01 49 08.still001
video

CIO Leadership Live with Douglas Blackwell, CIO at Horizon Blue Cross Blue Shield of New Jersey | Ep 12

In this episode, host Maryfran Johnson talks with Douglas Blackwell, senior vice president and CIO at Horizon Blue Cross Blue Shield of New Jersey, about digital transformation in the healthcare industry, including voice enablement...

piggy bank on top of a calculator

Making the case for security spend

How to gain management and customer support in security investments.

eddie garcia cloudera

CSO Spotlight: Eddie Garcia, Cloudera

For Eddie Garcia, job satisfaction comes from “[seeing his] contributions help organizations securely process data for good.” His best advice for aspiring security leaders is to focus on your passion and let the rest fall into place —...

orange number 5 pool ball top five 5 tips

5 simple steps for SMBs to ensure cyber resiliency

While these tips are by no means a complete guide for how SMBs can be resilient, they can be the start of a continuous process small and mid-sized business should implement to be better prepared.

template c100.00 01 36 08.still001
video

Top 10 IT predictions: Competing in the digitized economy

Frank Gens, IDC’s senior vice president and chief analyst, presents the analyst firm's annual outlook for the next several years in IT, including the top 10 worldwide IT industry predictions and how they will impact every enterprise’s...

nuclear power plant

The Three Mile Island event and cybersecurity incident response

Managing the deluge of data and alerts in a SOC can be challenging for any size organization. Observing the lessons learned from the Three Mile Island nuclear facility can help drive home some best practices for how to avoid common...

david cook databricks

CSO Spotlight: David Cook, Databricks

For Cook, the best trend in cybersecurity right now is the use of artificial intelligence and machine learning because, he says, "security is about spotting patterns, and new services based on machine learning can help analysts spot...

Load More
You Might Also Like