Your Next Move: Chief Information Security Officer
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
This site uses cookies to improve your experience. By viewing our content, you are accepting the use of cookies. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country we will assume you are from the United States. View our privacy policy and terms of use.
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
IT Toolbox
JANUARY 23, 2024
An information security management system (ISMS) is a structured approach to protect data, manage risks, and ensure cybersecurity compliance. The post What Is an Information Security Management System (ISMS)? Meaning, Working, Benefits, and Best Practices appeared first on Spiceworks.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
IT Toolbox
DECEMBER 19, 2022
How can IT teams update their data resilience and upgrade their security strategy? The post Data Resilience Predictions: Using the Economy to Inform Security Strategy appeared first on.
Forrester IT
AUGUST 1, 2022
We’ve said it many times: security matters, and security leaders have more influence and access to boards and senior executives than ever. Thanks to external forces like ransomware attacks, evolving security and privacy legislation, and existential loss of cyber insurance dread, they get it at the top.
Association of Information Technology Professional
SEPTEMBER 2, 2022
Information security analyst Scott Krager left personal training and got into cybersecurity. Here’s how he did it.
CTOvision
JUNE 3, 2020
Read Joan Goodchild list 10 information security tips for companies during layoffs on Dark Reading: Business disruption and the financial toll brought on by the COVID-19 has forced many companies, […].
Tech Republic Security
JANUARY 23, 2024
This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees. The goal is to facilitate the security response and remediation process to ensure the least amount of potential damage to systems, networks, customers and business reputation.
Social, Agile and Transformation
JULY 3, 2023
Some context: I rarely blog about information security because it’s outside my core expertise in digital transformation. It’s hard to drive transformation and also have a risk and security mindset, and it’s extraordinarily time-consuming to keep up with the latest security threats.
Information Week
JANUARY 12, 2022
Three technology jobs rank in the top 10 of U.S. News and World Report list of 2022 Best Jobs, evaluated on the basis of salary, work-life balance, and job outlook. Did your job make the list, and how does your salary compare to the median?
Tech Republic Security
JANUARY 11, 2023
The post Explore information security with 97% off this huge course bundle appeared first on TechRepublic. The training covers Docker, Splunk and AWS as you work toward CCSP certification.
Tech Republic Security
MARCH 12, 2024
Information is the lifeblood of the business. Any given technological environment is useless if its main purpose for existence — the processing and sharing of information — is threatened or eliminated. Without it, employees can’t work, customers can’t interact with the business, bills can’t be paid and profits can’t be earned.
Forrester IT
MARCH 9, 2021
First off, I’d like to express how thrilled I am to join Forrester’s security and risk research (S&R) team as a senior analyst. I’ve been working closely with this team for eight years in my previous role as a principal advisor to our chief information security officer (CISO) community, and I’m honored to join the […].
CTOvision
MAY 5, 2014
Architecture CTO Cyber Security DoD and IC Research antivirus Computer security Fixmo Hexis Information security invincea Symantec Triumfant Wall Street Journal' The reality is that antivirus software that uses old fashioned methods of signature analysi. To read more please log in.
CTOvision
AUGUST 6, 2021
US cybersecurity startup Elevate Security (Elevate) has launched an attack surface management platform that uses a customized and automated response to employee risk throughout an organization to overcome the unaddressed problems caused due to human errors.
IT Toolbox
FEBRUARY 22, 2024
Learn how CISOs (chief information security officer) can leverage financial metrics to communicate cybersecurity success effectively to the board. The post 3 Metrics CISOs Should Present to the Board and How to Calculate Them appeared first on Spiceworks.
CTOvision
JULY 29, 2020
Read why Praful Krishna says that information security challenges are proving to be a huge barrier for the artificial intelligence ecosystem on Dark Reading: Information security is all about keeping […].
Forrester IT
JUNE 8, 2017
Information Security. Security Operations & Program Governance. application security. In the end, you want I&O professionals to be policy enablers, not policy executors - automation helps get us there. Read more Categories: Development & Operations (DevOps). application management.
GeekWire
DECEMBER 8, 2023
Nordstrom Photo) — Nicole Ford joined Nordstrom as chief information security officer. Ford previously served as vice president and CISO at Rockwell Automation, with past experience leading security transformation initiatives and developing cybersecurity programs. Nicole Ford.
IT Toolbox
AUGUST 9, 2024
One of summer's top information security events, Black Hat 2024, ended on August 8. The post AI in Security, Microsoft Vulnerabilities, and More: Key Takeaways From Black Hat USA 2024 appeared first on Spiceworks Inc. The event comes at a time when AI affects everything from sports and politics to business and end consumers.
Forrester IT
MAY 11, 2017
I recently heard a segment on WBUR (a public radio station in Boston) on the emergence of microgrids and I was amazed at how much the concept of microgrids closely aligned with the concept of microperimeters within our Zero Trust model of information security.
Association of Information Technology Professional
FEBRUARY 19, 2021
Information security requires a specific set of skills. Arming your entire team with this knowledge is sure to equal success.
CTOvision
OCTOBER 17, 2018
The Chief Information Security Officer (CISO) of a company is becoming more and more important as cybersecurity threats increase in both frequency and reach.
Forrester IT
OCTOBER 3, 2018
After a very successful event last week in Washington, DC, our extended team of experts in information security, privacy, consumer behavior, and digital strategy is locking down the final details for Privacy & Security Forum Europe, which takes place in London on 9 and 10 October!
Forrester IT
SEPTEMBER 23, 2024
One of the three principles of High-performance IT (HPIT) is to build trust on a foundation of security, privacy and resilience. As a CIO, executing your strategy will be much easier if you unleash the talent of the person who plays an outsized role in building a trusted business: your Chief Information Security Officer (CISO). […]
Forrester IT
NOVEMBER 8, 2016
On November 7, China's top legislature adopted a cybersecurity law to safeguard the sovereignty on cyberspace, national security, and the rights of citizens. Some critics, especially those in Europe and the United States, continue to read too much into the negative impact of this legislation.
Tech Republic Data Center
SEPTEMBER 22, 2020
Security is changing rapidly, and the COVID-19 pandemic hasn't helped. A Cisco roundtable of chief information security officer advisers plotted the course for a secure future.
Forrester IT
JULY 6, 2018
Sure, the brand failed to keep her information secure – but where they really failed was in their next […]. I recently heard a story where a loyalty program member of an online retailer had her account hacked. Hackers then went on a shopping spree and as a result, she lost a significant loss of money.
CTOvision
FEBRUARY 6, 2019
It’s been nearly ten years since John Kindervag first published a paper recommending what he called the “zero trust” model of information security. In the […].
Information Week
MARCH 6, 2024
The more information chief information security officers can uncover about their security and tech stack, the better off they will be.
Forrester IT
APRIL 6, 2022
The Scorsese classic has a few surprising parallels with today's chief information security officer.
Forrester IT
NOVEMBER 20, 2024
Zero Trust has become the standard information security model to adopt globally. It’s no longer a question of should, it’s a question of how and where to begin. For some time, the topic of Zero Trust was met with disparaging and opposing views proclaiming it to be another buzzword for vendors to market products. Well, […]
Information Week
MAY 23, 2023
Inevitably, the chief information security officer role must adapt to keep up. Artificial intelligence arms both defenders and threat actors, rapidly reshaping the cybersecurity landscape.
Social, Agile and Transformation
MAY 13, 2024
I’m a digital transformation, product, technology, and data/AI leader, but I don’t count information security as a top area of expertise. But when it comes to
CTOvision
DECEMBER 2, 2019
Read Pieter Danhieux list most dangerous software errors of 2019 on Information Security Buzz : The amazing community at MITRE recently published their list of the CWE Top 25 Most Dangerous Software Errors affecting the world in 2019.
CTOvision
MAY 1, 2019
Read Spencer Young list three practical and proactive steps to improve your AI cybersecurity skills on Information Security Buzz : Much like the rest of the business world, cybersecurity teams are increasingly hearing how AI will revolutionize the way they work – usually for the better.
CTOvision
AUGUST 21, 2014
. “Being too down in the weeds at the technical level could actually be a little bit of a distraction,” Daniel, a special assistant to the president, says in an interview with Information Security Media Group. ” I know there are many facets to cyber security, cyber operations, cyber attack and cyber espionage.
Information Week
OCTOBER 11, 2023
Chief information security officers and chief information officers have distinct roles, but they share some common challenges.
Forrester IT
FEBRUARY 7, 2023
Forrester originated the Zero Trust Model over a decade ago and defines Zero Trust as: An information security model that denies access to applications and data by default.
Forrester IT
NOVEMBER 2, 2022
But that doesn’t mean that it should all be dismissed as nonsense, especially when it comes to information security. Even the most innocuous posts somehow manage to offend or anger someone out there on the internet. News of critical vulnerabilities, dangerous exploits, breaches, […].
Forrester IT
FEBRUARY 24, 2022
Compliance as a strategy has been one of my bugbears in information security for as long as I can remember.
CTOvision
OCTOBER 14, 2020
Read Rob Acker explain what ISO 27001 certification is and how it will help your organization on Infosec Magazine: Organizations adjusting to remote working are facing unprecedented information security challenges. […].
Network World
DECEMBER 13, 2022
Hackers understand that backup servers are often under-protected and administered by junior personnel that are less well versed in information security. This makes backup systems themselves the primary target of some ransomware groups, and warrants special attention.
Information Week
JULY 11, 2024
Chief information security officers need thorough recovery plans to ensure resilience and win the support of top execs. Recovering from a cyberattack is as important as defending against it.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content