Your Next Move: Chief Information Security Officer
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
Social, Agile and Transformation
JULY 3, 2023
Some context: I rarely blog about information security because it’s outside my core expertise in digital transformation. It’s hard to drive transformation and also have a risk and security mindset, and it’s extraordinarily time-consuming to keep up with the latest security threats.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Galido
FEBRUARY 25, 2020
Information Technology Blog - - The Small Business Guide to Information Security - Information Technology Blog. Information security is a major issue in the business world, and security breaches cost businesses millions of dollars per year. But they can be particularly disastrous to small businesses.
CTOvision
MARCH 30, 2015
The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Related articles. Cyber Security and the Data Protection Act (acunetix.com). Reception is free. April 08, 2015.
Network World
DECEMBER 30, 2016
Looking ahead to 2017, the Information Security Forum (ISF) , a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017.
Network World
NOVEMBER 15, 2021
(Enterprise Management Associates finds that enterprises are trying to improve collaboration between their network-infrastructure and operations teams and their information-security and cybersecurity teams. To read this article in full, please click here
Network World
FEBRUARY 15, 2017
The responsibilities of information security are rapidly changing as enterprises digitize. Digitization has spurred three company-wide shifts, creating the need for three associated new information security roles. Information security increasingly plays a larger role in advising business partners on strategy.
Network World
MARCH 28, 2017
The information security threat landscape is constantly evolving. But that dependence makes them vulnerable to attacks on core internet infrastructure, devices used in daily business and key people with access to mission-critical information. To read this article in full or to leave a comment, please click here
Network World
APRIL 26, 2017
But for organizations still maturing their defensive measures, here’s what the transformation of cyber crime into an industry means for how you approach information security. To read this article in full or to leave a comment, please click here
Network World
APRIL 11, 2017
Career Tracker: What it takes to be a chief information security officer. Jeff Foltz did not set out to be an information security professional. To read this article in full or to leave a comment, please click here (Insider Story)
CTOvision
OCTOBER 28, 2014
One of the many topics coved at the event was software defined perimeter and cloud security alliance. Related articles. On September 30 th Sierra Ventures hosted their 9th CIO summit in Palo Alto, CA. Coca-Cola was used as a case study. Alan Boehme , the acting CISO at Coca-Cola. Watch the recorded presentation here. legalzoom.com).
CTOvision
APRIL 21, 2014
Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. By Bob Gourley.
Cloud Musings
FEBRUARY 4, 2015
Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO). Grab this Headline Animator ( Thank you.
Computerworld Vertical IT
MARCH 3, 2022
That means every business or personal computer user should audit their existing security protections, particularly for companies that have embraced the hybrid workplace. To read this article in full, please click here
Network World
DECEMBER 13, 2022
Hackers understand that backup servers are often under-protected and administered by junior personnel that are less well versed in information security. To read this article in full, please click here And it seems no one wants to do something about it lest they become the new backup expert responsible for the server.
Network World
OCTOBER 20, 2023
Roughly 80% of CIOs reported that they plan to increase spending on cyber/information security in 2024, according to Gartner's 2024 CIO and Technology Executive Survey. To read this article in full, please click here Cybersecurity spending is also driving growth in the software segment.
CTOvision
AUGUST 11, 2014
Major breaches in the last year at large companies like Target and eBay have made information security discussions more worrying and more widespread, albeit still not universally understood. A Tweet from Jeffrey Carr, a cybersecurity guru quoted by Mr. Yardon, echoed the articles title.
ComputerWorld IT Management
JUNE 9, 2016
It seems that the industry has reached a nearly unanimous conclusion about a key essential for tight information security -- people. As an example, following a major security breach at the U.S. Office of Personnel Management, the agency announced that it would fill 1,000 information security positions.
Network World
FEBRUARY 19, 2019
The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. How edge computing can help secure the IoT.
Network World
AUGUST 4, 2016
To read this article in full or to leave a comment, please click here (Insider Story) High-flying salaries in some unexpected places Image by Greg Gjerdingen Before moving to this top city for InfoSec pay, you might want to read the latest John Sanford novel, brace for a bitter cold winter and develop a taste for tater tot hot dish.
Network World
FEBRUARY 19, 2019
The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. How edge computing can help secure the IoT.
Network World
MARCH 29, 2017
To read this article in full or to leave a comment, please click here Machine learning , the most prominent subset of AI, is about recognizing patterns in data and computer learning from them like a human. These algorithms draw inferences without being explicitly programmed to do so.
CIO Business Intelligence
SEPTEMBER 20, 2023
The role of the CIO (Chief Information Officer) and CISO (Chief Information Security Officer) have become increasingly important in recent years as organizations place more emphasis on digital transformation and information security. government further highlights the importance of the zero trust security framework.
CTOvision
OCTOBER 20, 2014
With Edward Snowden’s revelations, the myriad of recent information breaches at large corporations, and the extraordinary level of digitalization in our country, the American public has never placed a higher value on cyber security. CTOVision covered the story here. Good Luck with That.” The FBI is wrong about device encryption.
CTOvision
JUNE 23, 2015
Whether or not Roberts’ claims were true or whether or not his intentions were malicious, he brought to light the significant need to readdress aviation cyber security. Gourley led the discussion centered around the intense landscape of cyber threats, stressing the lack of security for Air Traffic Control (ATC) and avionics platforms.
CTOvision
JUNE 20, 2014
The urgency of improving information security cannot be understated. Since the widely publicized attack on Target Corporation, data breaches have become increasingly common – sensitive information stored with both eBay and the California Department of Motor Vehicles has been compromised in the last six months alone.
Network World
APRIL 19, 2021
“The [main treatment] plant was built [about] 15 years ago,” said Kristen Sanders, the authority’s chief information security officer. “So To read this article in full, please click here So if a piece of equipment went out, replacing it would be about shopping on eBay.”
Network World
SEPTEMBER 21, 2016
Are you taking on multiple job responsibilities at your company, including some aspects of information security? At many organizations, IT professionals are being asked to handle a variety of security tasks and functions. Download the State of Information Security research report ]. If so, you’re not alone.
SecureWorld News
AUGUST 23, 2023
For a solid rundown of what the updates mean, check out this SecureWorld article from Kip Boyle , vCISO, Cyber Risk Opportunities LLC. The addition of the 'implementation examples' are an extremely useful tool for organizations to actually implement the security controls they choose. 19, Detroit on Sept. Nader Zaveri – Sr.
Network World
MARCH 22, 2017
Internal threats Image by Thinkstock Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access, says Sam Elliott, director of security product management at Bomgar.
Network World
AUGUST 18, 2016
But you don't expect such proactive practices from an enterprise's information security team, which a CIO often enlists to place a moat around corporate assets. Mike Bartholomy, Western Union's senior manager for information security. To read this article in full or to leave a comment, please click here
Network World
FEBRUARY 1, 2017
Two officers of the Russian Federal Security Service (FSB) and a cybercrime investigator from Kaspersky Lab have reportedly been charged with treason for helping U.S. To read this article in full or to leave a comment, please click here intelligence services.
Galido
FEBRUARY 27, 2019
Information Technology Blog - - Steps for Performing a Cyber Security Assessment - Information Technology Blog. In every company’s risk management strategy, it is crucial that cyber-security risk assessment performed right; otherwise, the level of vulnerability to potential threat would be significantly high.
Network World
APRIL 25, 2017
There are two times you might have to talk to your organization’s board of directors about security: before a breach and after. That should mean the board wants to talk with you, the CISO, to learn firsthand what your department is doing to mitigate information security threats.
Network World
DECEMBER 22, 2016
There are more free information security tools out there than you can highlight with a fist full of whiteboard pointers. A few important categories include threat intelligence tools, tools to build security in during the development stage, penetration testers, and forensics tools. threat exchanges.
Network World
MARCH 1, 2016
Application security is arguably the biggest cyber threat , responsible for 90 percent of security incidents, according to the Department of Homeland Security. To read this article in full or to leave a comment, please click here (Insider Story)
Network World
DECEMBER 20, 2016
Security jobs Image by Thinkstock Information technology budgets are not expected to grow substantially in the New Year, but one area where organizations continue to invest is in information security. To read this article in full or to leave a comment, please click here (Insider Story)
Network World
SEPTEMBER 15, 2016
Stiff competition for talent and a limited pool of security specialists make information security staffing a perennial challenge. Complicating this is the fact that security has not yet adapted to its changing role as organizations digitize. To read this article in full or to leave a comment, please click here
Network World
APRIL 17, 2017
IT security consultants tend to be busy people. Given the widespread shortage of professionals with skills in many different aspects of cyber security, organizations frequently need help from outside experts. My computer studies led to me pursuing this thing called computer security.” My mom was exactly right!
Network World
DECEMBER 29, 2016
The high-water line in information security gets higher each year. To read this article in full or to leave a comment, please click here Just as we think we’ve finally figured out how to defend against attacks, then attackers come up with something new and we are right back to trying to figure out what to do next.
Network World
MAY 31, 2016
Employees are often considered the weakest link in organizations' efforts to create a strong security posture. Even organizations with security awareness programs in place struggle to instill strong security behaviors. To read this article in full or to leave a comment, please click here
Network World
FEBRUARY 1, 2017
It is no wonder that information security remains one of the most top-of-mind issues for CIOs, CISOs, and CEOs. The result is continued high demand for IT security pros. The market for IT security professionals is poised for another strong year,” notes CompTIA Senior Vice President Tim Herbert.
Computerworld Vertical IT
FEBRUARY 15, 2021
If you are working remotely you may already be using or looking for some way to use password-protected PDFs to help maintain information security. You can use the multi-talented Print dialog to create a secure PDF. To read this article in full, please click here Here is how to do so using your Mac's built-in software.
Network World
NOVEMBER 22, 2016
Depending on the size of the organization, the person who has the most impact on driving security advancement could be a C-level or board member, but non-executive administrators, and sometimes the one man IT/security show is the person paving the path. To read this article in full or to leave a comment, please click here
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content