Your Next Move: Chief Information Security Officer

Association of Information Technology Professional

This article details the necessary experience and education needed for a career as a chief information security officer

10 Tips for Maintaining Information Security During Layoffs

CTOvision

Read Joan Goodchild list 10 information security tips for companies during layoffs on Dark Reading: Business disruption and the financial toll brought on by the COVID-19 has forced many companies, […].

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

How to implement mindful information security practices

Tech Republic Security

Mindfulness is all about being aware, so why not incorporate that in your cybersecurity practices

Information Security: Four Ways to Prepare for Cyber Crises

CEB IT

Preventing confidential information leaking into the wrong hands has become high priority for every big company in the past decade. Information “breaches” have never been more costly to companies, or difficult to prevent. Information security staff play a critical role in resolving all these problems. Centrally documenting Information Security’s tribal knowledge helps everyone access important knowledge quickly.

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery

CEB IT

Information security teams, who themselves are no strangers to a rapidly changing work environment , are under pressure to ensure that all this activity doesn’t result in important confidential data ( itself more valuable than it’s ever been ) leaking out of the company – either from carelessness or criminal intent. 10 Ways Digitalization is Upending Information Security. unfulfilled security requirements) in the past twelve months.

How information security professionals can help business understand cyber risk

Computer Weekly

Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses

The Small Business Guide to Information Security

Galido

Information Technology Blog - - The Small Business Guide to Information Security - Information Technology Blog. Information security is a major issue in the business world, and security breaches cost businesses millions of dollars per year.

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. The conference brings together cyber security researchers, program managers, decision makers, security vendors, and practitioners to discuss many challenging tasks and novel solutions pertaining to cyber security. By Charles Hall.

Information security set for steep trajectory, says (ISC)2

Computer Weekly

By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession

The 6 Reasons Employees are Lax about Information Security

CEB IT

Information security teams can spend all the money in their budget on fancy technology but it’s for naught if employees don’t use it. Unsurprisingly then, given the amount of money currently being spent by firms in keeping their data and their systems secure , information security teams have almost doubled their spending on employee awareness in the past three years, from $1,597 per 1000 IT users in 2013 to $3,086 per 1000 IT users in 2016 , according to CEB data.

Creating a Culture of Information Security

Data Center Knowledge

Organizations need to start thinking about information security as an element that enables businesses, facilitating increased competitive advantage that allows them to manage risk and protect all of the dollars that have been spent on creating a brand. This is the first step in securing a business.

Brexit: Information security professionals not too concerned

Computer Weekly

Brexit will present some cyber security challenges – but it will be largely business as usual, say information security professionals

10 New Information Security Roles for the Digitization Era

CEB IT

High demand and a limited pool of people with the right skills and experience make information security staffing a perennial challenge. Further complicating things is the fact that information security teams have not yet adapted to their changing role in digitizing companies. Digitization requires security staff to play a more diverse range of roles to meet a wider spectrum of demand from the rest of the firm. Product security specialists/managers.

CESG issues challenge to information security professionals

Computer Weekly

CESG technical director Jonathan Lawrence tells The Cyber Security Summit that information security professionals need to deliver security controls that help business users achieve their goals securely

Information security needs to cast recruitment net wider, says panel

Computer Weekly

Companies struggling to fill info sec roles should focus on finding people who can do what they need, not on qualifications, according to a security industry panel

.Net 198

Cabinet Office role in information security in government not clear

Computer Weekly

The UK government has work to do to reduce complexity of security policies, according to the NAO

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Many college students tell me they want to be a hacker, an IT systems penetration tester, or other type of cyber security professional. Cyber InfoSec education infosec security awareness tools training

3 Ways to Protect Firms’ Information Security as they Digitize

CEB IT

The way companies create, sell, and market products, and run the operations to do so, is increasingly based on the use of technology and digital information (see chart 1), and this trend of digitization will only continue more quickly across the next five years. And digitization, fueled by business-led IT (line managers initiating and funding their own technology projects), places untenable pressure on the way that IT information security teams work.

Information security key to digital era business models

Computer Weekly

Security will become increasingly important as industries seek to collaborate and use each other’s capabilities to enable new business models, with the banking sector leading the way

IT Infrastructure: 3 Steps to Respond to Today’s Information Security Concerns

CEB IT

The plethora of recent high-profile breaches , and the funding and attention lavished on information security teams , have forced many IT infrastructure groups – those that are responsible for the company’s hardware, software, networks, data centers, and so on – to reprioritize their strategic plans and focus on information risk management. In fact, the security group is the only part of the infrastructure function where staffing levels are increasing.

Interview: Nick Bleech, head of information security, Travis Perkins

Computer Weekly

Last year Travis Perkins implemented Splunk to help it to respond more quickly to security threats. Now, the business is looking into machine learning and a single customer view

Information Security Budgets: More Money and More Staff, But Growth Finally Slowing

CEB IT

Information security functions have become far more important to their companies in the past decade, and that’s reflected in how the resources they’re allocated has grown and grown. Overall, there are a few changes that information security teams should expect in the coming year; the slide below has highlights. Security Staffing and Budget Increases. Security budgets grew an average of 16% in 2016 but are poised to only grow 9% in 2017.

Budget 150

Security Think Tank: Information security professionals have key role in GDPR compliance

Computer Weekly

What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018

Red Owl Analytics: Enabling information security and compliance teams to proactively tackle insider risk

CTOvision

Red Owl Analytics is a highly regarded provider of a software solution that enables security and compliance teams to proactively tackle their most pressing problem-- insider risk. Their enterprises are awash in data, insider-related security breaches have become a constant, and regulators continue to demand better oversight and surveillance. Guy finished his Army career as a special assistant to the Director of the National Security Agency.

Is Information Security the Right Profession for Me?

Linux Academy

Wondering if information security is the right profession for you? I’ve been working in information security for many years and have had the opportunity to fill a variety of roles. In this post, I’ll fill you in about some of the available jobs in information security and what it takes to succeed in each one. First off, there are many different jobs within information security. Security Analyst (Blue Teamer).

4 information security threats that will dominate 2017

Network World

Looking ahead to 2017, the Information Security Forum (ISF) , a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017. As with previous years, 2016 saw no shortage of data breaches.

9 biggest information security threats through 2019

Network World

The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the Information Security Forum (ISF) — a nonprofit association that researches and analyzes security and risk management issues on behalf of its members — puts out its Threat Horizon report to provide members with a forward-looking view of the biggest security threats over a two-year period.

2015 National Chief Information Security Officer Survey

Cloud Musings

Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO). Commissioned by the National Cybersecurity Institute at Excelsior College , this data will be used to develop and publish actionable information for use by the day to day cybersecurity professionals.

Grab two essential IT certifications on networking, information security and cybersecurity

TechSpot

This comprehensive 2-part bundle will help you ace the exams for the Systems Security Certified Practitioner (SSCP) and Certified Information Systems Security Professional (CISSP) certifications -- all through training that focuses on real-world examples

IDG Contributor Network: Cyber crime as a service forces changes in information security

Network World

But for organizations still maturing their defensive measures, here’s what the transformation of cyber crime into an industry means for how you approach information security. Cyber crime has been commercialized. Infecting computers with ransomware or using an advanced persistent threat to pilfer intellectual property no longer requires deep technical knowledge.

Obama Administration names first-ever federal Chief Information Security Officer

Tech Republic Security

The White House recently appointed retired Brigadier General Gregory J. Touhill as the US CISO, to bolster cybersecurity efforts in government

IDG Contributor Network: 3 new information security jobs for the digital enterprise

Network World

The responsibilities of information security are rapidly changing as enterprises digitize. In this new context, information security is expected to take a strategic role by helping business leaders understand the security implications of their digital strategies; support a quicker pace of technology exploitation and experimentation; and govern a larger, more varied project portfolio.

NIST's Cybersecurity Framework offers small businesses a vital information security toolset

Tech Republic Security

Small businesses run lean, and bad guys know that means security may be less than adequate. NIST researchers share ways that small businesses can protect their information

The 15 best cities for information security pay

Network World

High-flying salaries in some unexpected places Image by Greg Gjerdingen Before moving to this top city for InfoSec pay, you might want to read the latest John Sanford novel, brace for a bitter cold winter and develop a taste for tater tot hot dish. Yes, that's right, if you want to get the most bang for your InfoSec salary buck, a move to Minneapolis might be in your future. To read this article in full or to leave a comment, please click here (Insider Story

What it takes to become a chief information security officer (CISO)

Network World

Career Tracker: What it takes to be a chief information security officer. Jeff Foltz did not set out to be an information security professional. download. He arrived at his current role as CISO at Fidelity National Financial by making the most of a series of opportunities and constantly building his skillset. His degree in psychology and philosophy would also prove more useful in his CISO job than one might think.

IDG Contributor Network: How to build a thriving information security function despite the talent shortage

ComputerWorld IT Management

It seems that the industry has reached a nearly unanimous conclusion about a key essential for tight information security -- people. You don't have to look at online job postings for long to recognize that most of the posted IT jobs relate to information security, with employers attempting to fill many such positions to shore up their cybersecurity posture. As an example, following a major security breach at the U.S.

IDG Contributor Network: To improve information security, enterprises and government must share information

Network World

Information security is forever weaved into our daily lives. From the massive data breaches impacting Target, Yahoo and Anthem to IoT-powered DDoS attacks that take down substantial portions of the internet for extended periods of time, information security impacts everyone.

Information Risk: Balancing the Good and Bad of Data Analytics

CEB IT

The former has opened up companies to new security risks while the latter has left some customers feeling uneasy about the privacy of their data. Carry out due diligence on vendors’ supply chains : Companies are now increasingly integrated into complex third-party ecosystems, but not conducting the appropriate checks to ensure their security. Poor security standards across an ecosystem can therefore have trickle down effects to your organization.

Information Risk: How to Manage the Company’s Demand for Your Services

CEB IT

Information security teams face an unprecedented level of demand for their services right now. The strain on the time and resources of information security teams is understandable ( as Yahoo can attest ), and even though their companies are stumping up money, information security budget growth is slowing. Automating operations and governance activities offers the best chance to meet information security demands.

U.S. Federal Investigators Are Reportedly Looking Into Codecov Security Breach, Undetected for Months

GizModo VR

federal investigators are purportedly looking into a security breach at Codecov , a platform used to test software code with more 29,000 customers worldwide, Reuters reported on Saturday.

Information Risk: Third-Party Risk Management Is Failing

CEB IT

Information security teams are busier than they’ve ever been and, although they have been given more funds to cope, there is still a great need to prioritize and focus on the risks that are most likely to harm their business. Traditionally, information security teams have administered risk assessments and made decisions about the risk each third party posed based on predetermined levels, but this is no longer sufficient for the four reasons below.

Obama creates new Federal Chief Information Security Officer Post

Tech Republic Security

President Obama announced Thursday the creation of a new federal CISO position. Find out who was appointed and what they'll be doing

Data compliance startup Anecdotes raises $5 million to scale its enterprise platform

Venture Beast

Enterprise-grade data compliance platform Anecdotes raised $5 million dollars to expand its cross-framework IT capabilities to new clients. Read More.