article thumbnail

3 Metrics CISOs Should Present to the Board and How to Calculate Them

IT Toolbox

Learn how CISOs (chief information security officer) can leverage financial metrics to communicate cybersecurity success effectively to the board. The post 3 Metrics CISOs Should Present to the Board and How to Calculate Them appeared first on Spiceworks.

How To 303
article thumbnail

Brexit: Information security professionals not too concerned

Computer Weekly

Brexit will present some cyber security challenges – but it will be largely business as usual, say information security professionals

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. By Charles Hall. We noticed an event readers in the great state of Tennessee may take an interest in. Schedule: April 07, 2015.

article thumbnail

Rob Ferrill on His Tech Career, Integrated Solutions, and Raising Security Awareness

Information Week

AVP and CISO Rob Ferrill details his 30-year IT and Information Security background developing and operating security tools, processes, and policies, and previews his upcoming keynote presentation on our ‘Innovation and Cyber Resilience’ live webinar on Wednesday, November 29.

Security 100
article thumbnail

Robots present a cyber risk

Network World

In fact, experts say the growing use of robots by companies such as manufacturers, retailers, healthcare institutions and other businesses can present a number of cyber risks. There are two primary issues related to security and robotics, says Michael Overly, a partner and information security attorney at law firm Foley & Lardner.

article thumbnail

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

Ed Steinike , the CIO at Coca-Cola, and Bob Flores , the former CTO of the Central Intelligence Agency (CIA) and a partner at our parent firm Cognitio were the key presenters. Watch the recorded presentation here. Some of the issues discussed include the Internet of things, hacktivists and cyber attacks. Related articles.

article thumbnail

5 challenges for securing the future

CIO Business Intelligence

Information security has been an intriguing part of our past, is a critical part of our present, and will be a defining factor in our future. The economics of security are clear: “There is no financial stability without cybersecurity,” writes Loretta J. To have a future requires mastering information security.

Security 129