Your Next Move: Chief Information Security Officer

Association of Information Technology Professional

This article details the necessary experience and education needed for a career as a chief information security officer

Information Security Analyst Tops List of 2022 Top Jobs

Information Week

Three technology jobs rank in the top 10 of U.S. News and World Report list of 2022 Best Jobs, evaluated on the basis of salary, work-life balance, and job outlook. Did your job make the list, and how does your salary compare to the median

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Fortress Information Security receives $125M to find the answer to supply chain attacks

Venture Beast

Business Data Data infrastructure Enterprise Security category-/Business & Industrial category-/Computers & Electronics/Computer Security cybersecurity fortress information security supply chain attacks supply chain management

10 Tips for Maintaining Information Security During Layoffs

CTOvision

Read Joan Goodchild list 10 information security tips for companies during layoffs on Dark Reading: Business disruption and the financial toll brought on by the COVID-19 has forced many companies, […].

How information security professionals can help business understand cyber risk

Computer Weekly

Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses

How to implement mindful information security practices

Tech Republic Security

Mindfulness is all about being aware, so why not incorporate that in your cybersecurity practices

The Small Business Guide to Information Security

Galido

Information Technology Blog - - The Small Business Guide to Information Security - Information Technology Blog. Information security is a major issue in the business world, and security breaches cost businesses millions of dollars per year.

Information security set for steep trajectory, says (ISC)2

Computer Weekly

By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession

Brexit: Information security professionals not too concerned

Computer Weekly

Brexit will present some cyber security challenges – but it will be largely business as usual, say information security professionals

Creating a Culture of Information Security

Data Center Knowledge

Organizations need to start thinking about information security as an element that enables businesses, facilitating increased competitive advantage that allows them to manage risk and protect all of the dollars that have been spent on creating a brand. This is the first step in securing a business.

CESG issues challenge to information security professionals

Computer Weekly

CESG technical director Jonathan Lawrence tells The Cyber Security Summit that information security professionals need to deliver security controls that help business users achieve their goals securely

Information security needs to cast recruitment net wider, says panel

Computer Weekly

Companies struggling to fill info sec roles should focus on finding people who can do what they need, not on qualifications, according to a security industry panel

.Net 198

Cabinet Office role in information security in government not clear

Computer Weekly

The UK government has work to do to reduce complexity of security policies, according to the NAO

Information security key to digital era business models

Computer Weekly

Security will become increasingly important as industries seek to collaborate and use each other’s capabilities to enable new business models, with the banking sector leading the way

Interview: Nick Bleech, head of information security, Travis Perkins

Computer Weekly

Last year Travis Perkins implemented Splunk to help it to respond more quickly to security threats. Now, the business is looking into machine learning and a single customer view

Security Think Tank: Information security professionals have key role in GDPR compliance

Computer Weekly

What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018

Store unlimited passwords and sensitive information securely with 1Password

TechSpot

Available for the vast majority of operating systems, 1Password stores all your passwords and can be also used as a digital wallet. It features two-factor authentication and now includes a "Masked Email" option. Though it is not free, you can try it for 14 days here

Is Information Security the Right Profession for Me?

Linux Academy

Wondering if information security is the right profession for you? I’ve been working in information security for many years and have had the opportunity to fill a variety of roles. In this post, I’ll fill you in about some of the available jobs in information security and what it takes to succeed in each one. First off, there are many different jobs within information security. Security Analyst (Blue Teamer).

Red Owl Analytics: Enabling information security and compliance teams to proactively tackle insider risk

CTOvision

Red Owl Analytics is a highly regarded provider of a software solution that enables security and compliance teams to proactively tackle their most pressing problem-- insider risk. Their enterprises are awash in data, insider-related security breaches have become a constant, and regulators continue to demand better oversight and surveillance. Guy finished his Army career as a special assistant to the Director of the National Security Agency.

Elevate Security unveils cybersecurity surface management platform

CTOvision

US cybersecurity startup Elevate Security (Elevate) has launched an attack surface management platform that uses a customized and automated response to employee risk throughout an organization to overcome the unaddressed problems caused due to human errors. News Elevate Security

Automation For The Better Good - Security

Forrester IT

What these tasks have in common (in addition to relying on automation): a critical dependence on security. When you accept that jury duty request, you have faith that your PII (personally identifiable information) is being protected. In a world where infrastructure-as-code scales quickly and massively scales, it is crucial to bake in security at every level of the stack. Information Security. Security Operations & Program Governance.

2015 National Chief Information Security Officer Survey

Cloud Musings

Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO). Commissioned by the National Cybersecurity Institute at Excelsior College , this data will be used to develop and publish actionable information for use by the day to day cybersecurity professionals.

9 biggest information security threats through 2019

Network World

The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the Information Security Forum (ISF) — a nonprofit association that researches and analyzes security and risk management issues on behalf of its members — puts out its Threat Horizon report to provide members with a forward-looking view of the biggest security threats over a two-year period.

4 information security threats that will dominate 2017

Network World

Looking ahead to 2017, the Information Security Forum (ISF) , a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017. As with previous years, 2016 saw no shortage of data breaches.

NIST's Cybersecurity Framework offers small businesses a vital information security toolset

Tech Republic Security

Small businesses run lean, and bad guys know that means security may be less than adequate. NIST researchers share ways that small businesses can protect their information

Symantec Finally Agrees With Everyone Else In The Security Community: Says Antivirus Software Is Dead

CTOvision

But the hottest firms in cyber security, those growing because they make real, measurable, virtuous differences in enterprise security, are growing because they realized that Symantec''s core antivirus features just are not sufficient. Architecture CTO Cyber Security DoD and IC Research antivirus Computer security Fixmo Hexis Information security invincea Symantec Triumfant Wall Street Journal

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

Chief Cyberinfrastructure Security Officer. Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. The CCSO provides leadership for the Internet2 cyber security program through strong working relationships and collaboration across the staff and community, including policy and operational areas.

Obama Administration names first-ever federal Chief Information Security Officer

Tech Republic Security

The White House recently appointed retired Brigadier General Gregory J. Touhill as the US CISO, to bolster cybersecurity efforts in government

Grab two essential IT certifications on networking, information security and cybersecurity

TechSpot

This comprehensive 2-part bundle will help you ace the exams for the Systems Security Certified Practitioner (SSCP) and Certified Information Systems Security Professional (CISSP) certifications -- all through training that focuses on real-world examples

IDG Contributor Network: Cyber crime as a service forces changes in information security

Network World

But for organizations still maturing their defensive measures, here’s what the transformation of cyber crime into an industry means for how you approach information security. Cyber crime has been commercialized. Infecting computers with ransomware or using an advanced persistent threat to pilfer intellectual property no longer requires deep technical knowledge.

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

One of the many topics coved at the event was software defined perimeter and cloud security alliance. CTO Cyber Security News Video Bob Flores Chief information officer Chief information security officer CISO Coca-Cola Computer security Internet of Things Sierra Ventures On September 30 th Sierra Ventures hosted their 9th CIO summit in Palo Alto, CA. Coca-Cola was used as a case study. Alan Boehme , the acting CISO at Coca-Cola.

IDG Contributor Network: 3 new information security jobs for the digital enterprise

Network World

The responsibilities of information security are rapidly changing as enterprises digitize. In this new context, information security is expected to take a strategic role by helping business leaders understand the security implications of their digital strategies; support a quicker pace of technology exploitation and experimentation; and govern a larger, more varied project portfolio.

Under the AI hood: A view from RSA Conference

Venture Beast

Despite hype around AI and ML in security, the RSA Conference revealed promising developments, like an evaluation system for buyers. Read More.

Obama creates new Federal Chief Information Security Officer Post

Tech Republic Security

President Obama announced Thursday the creation of a new federal CISO position. Find out who was appointed and what they'll be doing

Scale and Speed with Cyber Security

CTOvision

Dealing with the scale that the internet can deliver, has unfortunately left us with a series of other non-optimal cyber security approaches and solutions. Out of all the problems to deal with subverting bureaucracy to enable security scaling is the hardest. FISMA) – if it can’t be automated, don’t require it (and it probably doesn’t give you real security anyway) and third, supply chain: intentionally understanding (and automating) the software supply chain.

IDG Contributor Network: To improve information security, enterprises and government must share information

Network World

Information security is forever weaved into our daily lives. From the massive data breaches impacting Target, Yahoo and Anthem to IoT-powered DDoS attacks that take down substantial portions of the internet for extended periods of time, information security impacts everyone.

The CISO Technology Report: Twice A Week Review For Enterprise Security Professionals

CTOvision

Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. This has become one of our most popular lists, with over 2,000 security professionals subscribing to the report. By Bob Gourley.

Security Think Tank: Cyber security is everyone’s responsibility

Computer Weekly

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses

Top 5 trends for endpoint security In 2022

Venture Beast

Learn more Bad actors continue to capitalize on the widening gaps in endpoint security that all organizations are planning to improve in 2022. chief information security officers (CISOs) and their teams are stretche… Read More.

Trends 109

The 15 best cities for information security pay

Network World

High-flying salaries in some unexpected places Image by Greg Gjerdingen Before moving to this top city for InfoSec pay, you might want to read the latest John Sanford novel, brace for a bitter cold winter and develop a taste for tater tot hot dish. Yes, that's right, if you want to get the most bang for your InfoSec salary buck, a move to Minneapolis might be in your future. To read this article in full or to leave a comment, please click here (Insider Story

Patient Portal Puts a Spotlight on Secure Messaging

CTOvision

Stage 2 requires expanded use of patient portals, as well as implementation of secure messaging, allowing patients to exchange information with physicians regarding their health care. Given the Health Insurance Portability and Accountability Act (HIPAA) requirement for secure communication of Protected Health Information (PHI), a spotlight has been placed on the support for secure messaging. Secure Messaging Requires Authentication and Secure Networks.

What it takes to become a chief information security officer (CISO)

Network World

Career Tracker: What it takes to be a chief information security officer. Jeff Foltz did not set out to be an information security professional. download. He arrived at his current role as CISO at Fidelity National Financial by making the most of a series of opportunities and constantly building his skillset. His degree in psychology and philosophy would also prove more useful in his CISO job than one might think.

Security Think Tank: Communication is key to cyber security in digital era

Computer Weekly

How can information security professionals help organisations to understand the cyber risks across increasingly digital businesses