article thumbnail

3 Metrics CISOs Should Present to the Board and How to Calculate Them

IT Toolbox

Learn how CISOs (chief information security officer) can leverage financial metrics to communicate cybersecurity success effectively to the board. The post 3 Metrics CISOs Should Present to the Board and How to Calculate Them appeared first on Spiceworks.

How To 303
article thumbnail

Brexit: Information security professionals not too concerned

Computer Weekly

Brexit will present some cyber security challenges – but it will be largely business as usual, say information security professionals

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Rob Ferrill on His Tech Career, Integrated Solutions, and Raising Security Awareness

Information Week

AVP and CISO Rob Ferrill details his 30-year IT and Information Security background developing and operating security tools, processes, and policies, and previews his upcoming keynote presentation on our ‘Innovation and Cyber Resilience’ live webinar on Wednesday, November 29.

Security 100
article thumbnail

The 10th Cyber & Information Security Research (CISR) Conference at Oak Ridge Tn, 7-9 April 2015

CTOvision

The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Cyber Security and the Data Protection Act (acunetix.com). Registration is required but ORNL employees attend at no cost.

article thumbnail

5 challenges for securing the future

CIO Business Intelligence

Information security has been an intriguing part of our past, is a critical part of our present, and will be a defining factor in our future. The economics of security are clear: “There is no financial stability without cybersecurity,” writes Loretta J. To have a future requires mastering information security.

Security 123
article thumbnail

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

One of the many topics coved at the event was software defined perimeter and cloud security alliance. Ed Steinike , the CIO at Coca-Cola, and Bob Flores , the former CTO of the Central Intelligence Agency (CIA) and a partner at our parent firm Cognitio were the key presenters. Watch the recorded presentation here.

article thumbnail

The Security Innovation Network Showcase: 3-4 Dec in DC

CTOvision

We have been long-term supporters of the Security Innovation Network (SINET) and believe this group plays an important role in being a catalyst for innovation around enterprise cyber security. Industry Thought Leader Solo Presentations. Workshops and Panel Presentations. Pre Event VIP reception (invitation only).

Network 276