article thumbnail

A must-read IT security handbook: TAG Cyber's massive 2017 guide

Tech Republic Security

The handbook includes tech recommendations on 50 controls, interviews, and vendor lists. TAG Cyber CEO Dr. Edward Amoroso has created a 1,200+ page resource for cybersecurity pros.

Handbook 419
article thumbnail

How CIOs can navigate a perfect digital storm of complexity, competition, and regulation

CIO Business Intelligence

The FFIEC handbook, for example, requires security analysts to have an enterprise-wide understanding of the architecture and interoperability of systems and components.

Handbook 130
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Key skills tech leaders need to secure a board seat

CIO Business Intelligence

We’ve also published, in partnership with the Internet Security Alliance (ISA), the 2023 Director’s Handbook on Cyber-Risk Oversight. Careers, CIO, CSO and CISO, IT Leadership, Security It’s the fourth edition, and been distributed to our 23,000 members and made available to the public. It’s a win-win.

Security 290
article thumbnail

How DBAs can take on a more strategic role

CIO Business Intelligence

While they played a critical enterprise role, it was primarily behind-the-scenes to ensure the integrity, security, and availability of the database. Not that long ago, database administrators (DBAs) were perceived as purely technical experts. Today, DBAs are being pulled into the limelight. Corporate data is gold, and DBAs are its stewards.

article thumbnail

Top 10 governance, risk, and compliance certifications

CIO Business Intelligence

A variety of roles in the enterprise require or benefit from a GRC certification, such as chief information officer, IT security analyst, security engineer architect, information assurance program manager, and senior IT auditor , among others. Enter the need for competent governance, risk and compliance (GRC) professionals.

article thumbnail

Securing the Final Frontier: NASA Space Security Best Practices Guide

SecureWorld News

It released the Space Security: Best Practices Guide (BPG) , a landmark document designed to safeguard every satellite, communication, and mission from the lurking threats of the digital unknown. Mitigating Risks, Not Replacing Requirements: The BPG acts as a supplementary tool, not a replacement for existing security standards.

Security 109
article thumbnail

Cybercriminals Exploiting HR Policy Announcements in Phishing Attacks

SecureWorld News

Abnormal Security, a cybersecurity solutions provider, has published research on these phishing attacks , highlighting two specific types: payload-based credential phishing attacks and link-based credential phishing attacks. These emails typically include links or attachments that are used to steal employee credentials.