Your Next Move: Chief Information Security Officer
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer
CTOvision
JUNE 3, 2020
Read Joan Goodchild list 10 information security tips for companies during layoffs on Dark Reading: Business disruption and the financial toll brought on by the COVID-19 has forced many companies, […].
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Information Week
JANUARY 12, 2022
Three technology jobs rank in the top 10 of U.S. News and World Report list of 2022 Best Jobs, evaluated on the basis of salary, work-life balance, and job outlook. Did your job make the list, and how does your salary compare to the median
Venture Beast
APRIL 19, 2022
Business Data Data infrastructure Enterprise Security category-/Business & Industrial category-/Computers & Electronics/Computer Security cybersecurity fortress information security supply chain attacks supply chain management
Computer Weekly
JANUARY 17, 2017
Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses
Computer Weekly
OCTOBER 27, 2016
By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession
Tech Republic Security
JANUARY 8, 2021
Mindfulness is all about being aware, so why not incorporate that in your cybersecurity practices
CTOvision
MARCH 30, 2015
The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. The conference brings together cyber security researchers, program managers, decision makers, security vendors, and practitioners to discuss many challenging tasks and novel solutions pertaining to cyber security. By Charles Hall.
Data Center Knowledge
OCTOBER 18, 2016
Organizations need to start thinking about information security as an element that enables businesses, facilitating increased competitive advantage that allows them to manage risk and protect all of the dollars that have been spent on creating a brand. This is the first step in securing a business.
Computer Weekly
JUNE 28, 2016
Brexit will present some cyber security challenges – but it will be largely business as usual, say information security professionals
Computer Weekly
JUNE 22, 2016
CESG technical director Jonathan Lawrence tells The Cyber Security Summit that information security professionals need to deliver security controls that help business users achieve their goals securely
Computer Weekly
OCTOBER 19, 2016
Companies struggling to fill info sec roles should focus on finding people who can do what they need, not on qualifications, according to a security industry panel
Computer Weekly
SEPTEMBER 15, 2016
The UK government has work to do to reduce complexity of security policies, according to the NAO
Computer Weekly
APRIL 21, 2017
Security will become increasingly important as industries seek to collaborate and use each other’s capabilities to enable new business models, with the banking sector leading the way
Computer Weekly
MAY 24, 2017
Last year Travis Perkins implemented Splunk to help it to respond more quickly to security threats. Now, the business is looking into machine learning and a single customer view
TechSpot
OCTOBER 1, 2021
Available for the vast majority of operating systems, 1Password stores all your passwords and can be also used as a digital wallet. It features two-factor authentication and now includes a "Masked Email" option. Though it is not free, you can try it for 14 days here
Computer Weekly
JUNE 6, 2016
What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018
CTOvision
MAY 4, 2015
Red Owl Analytics is a highly regarded provider of a software solution that enables security and compliance teams to proactively tackle their most pressing problem-- insider risk. Their enterprises are awash in data, insider-related security breaches have become a constant, and regulators continue to demand better oversight and surveillance. Guy finished his Army career as a special assistant to the Director of the National Security Agency.
Linux Academy
FEBRUARY 5, 2019
Wondering if information security is the right profession for you? I’ve been working in information security for many years and have had the opportunity to fill a variety of roles. In this post, I’ll fill you in about some of the available jobs in information security and what it takes to succeed in each one. First off, there are many different jobs within information security. Security Analyst (Blue Teamer).
Cloud Musings
FEBRUARY 4, 2015
Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO). Commissioned by the National Cybersecurity Institute at Excelsior College , this data will be used to develop and publish actionable information for use by the day to day cybersecurity professionals.
Network World
MARCH 28, 2017
The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the Information Security Forum (ISF) — a nonprofit association that researches and analyzes security and risk management issues on behalf of its members — puts out its Threat Horizon report to provide members with a forward-looking view of the biggest security threats over a two-year period.
Network World
DECEMBER 30, 2016
Looking ahead to 2017, the Information Security Forum (ISF) , a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017. As with previous years, 2016 saw no shortage of data breaches.
Tech Republic Security
SEPTEMBER 9, 2016
The White House recently appointed retired Brigadier General Gregory J. Touhill as the US CISO, to bolster cybersecurity efforts in government
TechSpot
NOVEMBER 3, 2020
This comprehensive 2-part bundle will help you ace the exams for the Systems Security Certified Practitioner (SSCP) and Certified Information Systems Security Professional (CISSP) certifications -- all through training that focuses on real-world examples
Network World
APRIL 26, 2017
But for organizations still maturing their defensive measures, here’s what the transformation of cyber crime into an industry means for how you approach information security. Cyber crime has been commercialized. Infecting computers with ransomware or using an advanced persistent threat to pilfer intellectual property no longer requires deep technical knowledge.
Tech Republic Security
DECEMBER 7, 2016
Small businesses run lean, and bad guys know that means security may be less than adequate. NIST researchers share ways that small businesses can protect their information
Network World
FEBRUARY 15, 2017
The responsibilities of information security are rapidly changing as enterprises digitize. In this new context, information security is expected to take a strategic role by helping business leaders understand the security implications of their digital strategies; support a quicker pace of technology exploitation and experimentation; and govern a larger, more varied project portfolio.
Tech Republic Security
FEBRUARY 7, 2017
President Obama announced Thursday the creation of a new federal CISO position. Find out who was appointed and what they'll be doing
Network World
MARCH 1, 2017
Information security is forever weaved into our daily lives. From the massive data breaches impacting Target, Yahoo and Anthem to IoT-powered DDoS attacks that take down substantial portions of the internet for extended periods of time, information security impacts everyone.
Network World
AUGUST 4, 2016
High-flying salaries in some unexpected places Image by Greg Gjerdingen Before moving to this top city for InfoSec pay, you might want to read the latest John Sanford novel, brace for a bitter cold winter and develop a taste for tater tot hot dish. Yes, that's right, if you want to get the most bang for your InfoSec salary buck, a move to Minneapolis might be in your future. To read this article in full or to leave a comment, please click here (Insider Story
Network World
APRIL 11, 2017
Career Tracker: What it takes to be a chief information security officer. Jeff Foltz did not set out to be an information security professional. download. He arrived at his current role as CISO at Fidelity National Financial by making the most of a series of opportunities and constantly building his skillset. His degree in psychology and philosophy would also prove more useful in his CISO job than one might think.
Venture Beast
MAY 21, 2021
Despite hype around AI and ML in security, the RSA Conference revealed promising developments, like an evaluation system for buyers. Read More.
Forrester IT
JUNE 8, 2017
What these tasks have in common (in addition to relying on automation): a critical dependence on security. When you accept that jury duty request, you have faith that your PII (personally identifiable information) is being protected. In a world where infrastructure-as-code scales quickly and massively scales, it is crucial to bake in security at every level of the stack. Information Security. Security Operations & Program Governance.
Network World
MARCH 29, 2017
Although it dates as far back as the 1950s, Artificial Intelligence (AI) is the hottest thing in technology today. An overarching term used to describe a set of technologies such as text-to-speech, natural language processing (NLP) and computer vision, AI essentially enables computers to do things normally done by people. Machine learning , the most prominent subset of AI, is about recognizing patterns in data and computer learning from them like a human.
KineticData
JANUARY 26, 2022
Customer Experience Information Security securityThis week we are celebrating a different type of success with a tip of the cap for the amazing development team here at Kinetic Data.
CTOvision
JULY 26, 2016
Artificial Intelligence CTO Cyber Security Chief information security officer Chief Technology Officer Computer security Information security information technologyBob Gourley. During interview today with GovMatters.tv I'll be discussing an observation many of us in the enterprise technology community have been discussing lately.
CTOvision
MAY 5, 2014
But the hottest firms in cyber security, those growing because they make real, measurable, virtuous differences in enterprise security, are growing because they realized that Symantec''s core antivirus features just are not sufficient. Architecture CTO Cyber Security DoD and IC Research antivirus Computer security Fixmo Hexis Information security invincea Symantec Triumfant Wall Street Journal
ComputerWorld IT Management
JUNE 9, 2016
It seems that the industry has reached a nearly unanimous conclusion about a key essential for tight information security -- people. You don't have to look at online job postings for long to recognize that most of the posted IT jobs relate to information security, with employers attempting to fill many such positions to shore up their cybersecurity posture. As an example, following a major security breach at the U.S.
Venture Beast
FEBRUARY 10, 2021
Enterprise-grade data compliance platform Anecdotes raised $5 million dollars to expand its cross-framework IT capabilities to new clients. Read More.
CTOvision
MARCH 27, 2014
Chief Cyberinfrastructure Security Officer. Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. The CCSO provides leadership for the Internet2 cyber security program through strong working relationships and collaboration across the staff and community, including policy and operational areas.
GizModo VR
FEBRUARY 11, 2021
accellion data breach business finance information governance cryptography technology internet articles security security breaches information security data security vulnerability computer security
CTOvision
MAY 6, 2014
Analytical Tool Companies Company Catelas FCPA Financial Services Information security Catelas is a solution on the market today that maps out large communications networks. The software''s unique value is its ability to automatically identify the people that matter in any dataset – a specific case (collected data) or across the entire company (log files or email meta-data).
CTOvision
MARCH 17, 2015
FBI Director James Comey consistently underscores the threat of cybercrime to corporate America by repeating what security professionals have long known: “there are two kinds of companies in the United States, those who know they have been hacked and those that don’t know they have been hacked.” Conducting a holistic review of the organization to identify areas of vulnerability and improve network security is a proactive measure that no organization should overlook.
Let's personalize your content