IT Leadership

IT Leadership | News, how-tos, features, reviews, and videos

CSO Spotlight Q&A > Tracy Reinhold, Everbridge

CSO Spotlight: Tracy Reinhold, Everbridge

How a successful career in the FBI along with the events of 9/11 put Tracy Reinhold on the path to a career in cybersecurity.

executive superimposed on buildings leadership

What makes CISOs successful?

Leadership and communication skills top the list of what's needed to succeed as a chief information security officer (CISO), while technical skills aren’t nearly as important.

multi tasking running executive race speed internet mobile laptop

Hack like a CISO

Developing the security officers' processes, strategies and techniques for managing their time, resources and teams.

eye binary IDS Intrusion Detection System

Cybersecurity operations: Don't wait for the alert

An SOC is a useful part of our cybersecurity arsenal, but its main benefit will be in helping to minimize damage from an issue that has already happened. A strong investigative team, on the other hand, can help to identify and resolve...

justin berman zenefits

CSO Spotlight: Justin Berman, Zenefits

Being wrong is good, embrace it, learn from it and grow from it, advises Berman. Being an effective security leader is about recognizing that "your job is to get the best answer, not to have it."

service management

IT service management: security’s best friend

Your IT service management (ITSM) teams can serve up good security practices with your help.

david smith nuix

CSO Spotlight: David Smith, Nuix

Winning the war against cybercrime is getting closer to reality as law enforcement dedicates more resources to cybersecurity investigations and improves cyber-related laws.

5 fumbling dumb mistake

The ostrich security strategy is now very risky

Ignorance of a serious security event is unreasonable, and just like ignorance of the law, it is no defense.

annalea llg flexential

CSO Spotlight: Annalea Ilg, Flexential

The cybersecurity threat is ever growing and its clear companies are still not following basic security practices. If they were, we wouldn’t be seeing so many breach notifications, says Ilg.

board ceo executives table

Top reasons CEOs should care about privacy

Privacy protection will undoubtedly be one of the defining issues of the internet age, and it’s important for leaders and companies to take notice and actively prevent breaches and protect their customers.

Lego wall breakthrough

Does DevSecOps eliminate the segregation of duties between security and DevOps?

Yes, some cloud-native application development tools include basic security features. No, that does not mean DevOps should “own” security.

piggy bank on top of a calculator

Making the case for security spend

How to gain management and customer support in security investments.

eddie garcia cloudera

CSO Spotlight: Eddie Garcia, Cloudera

For Eddie Garcia, job satisfaction comes from “[seeing his] contributions help organizations securely process data for good.” His best advice for aspiring security leaders is to focus on your passion and let the rest fall into place —...

orange number 5 pool ball top five 5 tips

5 simple steps for SMBs to ensure cyber resiliency

While these tips are by no means a complete guide for how SMBs can be resilient, they can be the start of a continuous process small and mid-sized business should implement to be better prepared.

template c100.00 01 36 08.still001
video

Top 10 IT predictions: Competing in the digitized economy

Frank Gens, IDC’s senior vice president and chief analyst, presents the analyst firm's annual outlook for the next several years in IT, including the top 10 worldwide IT industry predictions and how they will impact every enterprise’s...

nuclear power plant

The Three Mile Island event and cybersecurity incident response

Managing the deluge of data and alerts in a SOC can be challenging for any size organization. Observing the lessons learned from the Three Mile Island nuclear facility can help drive home some best practices for how to avoid common...

david cook databricks

CSO Spotlight: David Cook, Databricks

For Cook, the best trend in cybersecurity right now is the use of artificial intelligence and machine learning because, he says, "security is about spotting patterns, and new services based on machine learning can help analysts spot...

11 support boardroom

Security metrics you need for the board

No one wants to show up to an important meeting empty-handed. But with so many analytics right at their fingertips, how can CSOs pick the right numbers to reflect their work? Here are three imperative metrics to have in your...

leading digital transformation puppet

Leveraging digital transformation

Data protection plays a key part in digital transformation adoptions, changes to existing practices and reforming company culture. Digital transformation expert Vic Tingler discusses how businesses can digitally transform to increase...

template c100.00 02 07 12.still001
video

What is Six Sigma? Streamlining quality management

Six Sigma streamlines quality control in an effort to improve current processes, products or services. Here are the methodologies, roles and certifications central to this quality management methodology.

Load More