10 Tips for Maintaining Information Security During Layoffs

CTOvision

Read Joan Goodchild list 10 information security tips for companies during layoffs on Dark Reading: Business disruption and the financial toll brought on by the COVID-19 has forced many companies, […].

Information Security: Four Ways to Prepare for Cyber Crises

CEB IT

Preventing confidential information leaking into the wrong hands has become high priority for every big company in the past decade. Information “breaches” have never been more costly to companies, or difficult to prevent.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Information Security: What You Should Know About Agile, DevOps, and Continuous Delivery

CEB IT

10 Ways Digitalization is Upending Information Security. A recent survey of around two dozen heads of information security produced a useful overview of the nature of this problem and how some of the world’s most forward-thinking teams are responding.

The Small Business Guide to Information Security

Galido

Information Technology Blog - - The Small Business Guide to Information Security - Information Technology Blog. Information security is a major issue in the business world, and security breaches cost businesses millions of dollars per year.

Information Security: The 8 Types of Risk Assessment You Should Know About

CEB IT

Chart 1 below can help with understanding the different types of risk assessment that information security teams need to conduct, and may also help explain the process, and the importance of it, to colleagues.

How information security professionals can help business understand cyber risk

Computer Weekly

Information security is continually moving up business and board agendas, but information security professionals find it challenging to help business leaders to understand fully the cyber risks across increasingly digital businesses

The 6 Reasons Employees are Lax about Information Security

CEB IT

Information security teams can spend all the money in their budget on fancy technology but it’s for naught if employees don’t use it. They should base their campaigns on the six root causes that are most likely to motivate employees to behave securely or not.

10 New Information Security Roles for the Digitization Era

CEB IT

High demand and a limited pool of people with the right skills and experience make information security staffing a perennial challenge. Further complicating things is the fact that information security teams have not yet adapted to their changing role in digitizing companies.

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Cyber InfoSec education infosec security awareness tools training

Information security set for steep trajectory, says (ISC)2

Computer Weekly

By helping to create a thriving, diverse and open information security community, (ISC)2 hopes to ensure a steep rise for the profession

Creating a Culture of Information Security

Data Center Knowledge

Organizations need to start thinking about information security as an element that enables businesses, facilitating increased competitive advantage that allows them to manage risk and protect all of the dollars that have been spent on creating a brand. This is the first step in securing a business.

Brexit: Information security professionals not too concerned

Computer Weekly

Brexit will present some cyber security challenges – but it will be largely business as usual, say information security professionals

3 Ways to Protect Firms’ Information Security as they Digitize

CEB IT

The way companies create, sell, and market products, and run the operations to do so, is increasingly based on the use of technology and digital information (see chart 1), and this trend of digitization will only continue more quickly across the next five years.

Enterprise Meets Consumer Security: Exploring Approaches To Protect Employees At Home

Forrester IT

age of the customer cloud security content security cybersecurity data security endpoint security information security IoT security mobile security network security physical security privacy security & risk

CESG issues challenge to information security professionals

Computer Weekly

CESG technical director Jonathan Lawrence tells The Cyber Security Summit that information security professionals need to deliver security controls that help business users achieve their goals securely

Maintain Your Security Edge: Develop And Retain Cybersecurity Talent

Forrester IT

cybersecurity information security retention management security & risk staff development & succession management Security & RiskAs an industry, we gripe about hiring and struggle with retention.

Information security needs to cast recruitment net wider, says panel

Computer Weekly

Companies struggling to fill info sec roles should focus on finding people who can do what they need, not on qualifications, according to a security industry panel

.Net 198

Cabinet Office role in information security in government not clear

Computer Weekly

The UK government has work to do to reduce complexity of security policies, according to the NAO

Our Security Recommendations Will Help You Handle The Worst Of What 2019 Throws At You

Forrester IT

Today we released our 2019 Security & Risk Recommendations report. We collected contributions from our colleagues across the Forrester Security & Risk team to identify the most important actions security leaders should take in 2019.

Is Information Security the Right Profession for Me?

Linux Academy

Wondering if information security is the right profession for you? I’ve been working in information security for many years and have had the opportunity to fill a variety of roles. First off, there are many different jobs within information security.

IT Infrastructure: 3 Steps to Respond to Today’s Information Security Concerns

CEB IT

In fact, the security group is the only part of the infrastructure function where staffing levels are increasing. Blog Collaborate Across the Organization Information and Data Risk Management Information Technology IT Infrastructure

Information Security Budgets: More Money and More Staff, But Growth Finally Slowing

CEB IT

Information security functions have become far more important to their companies in the past decade, and that’s reflected in how the resources they’re allocated has grown and grown. Security Staffing and Budget Increases.

Budget 195

New Tech Spotlight: Security Technology Takes Center Stage

Forrester IT

Venture capital and private equity spending on security technology reached an all-time high in 2018. While that total may pale in comparison to other fast-growing markets such as fintech ($124B) or transportation tech ($150B), consider that 65% of that $31B in security has […].

Red Owl Analytics: Enabling information security and compliance teams to proactively tackle insider risk

CTOvision

Red Owl Analytics is a highly regarded provider of a software solution that enables security and compliance teams to proactively tackle their most pressing problem-- insider risk. Guy finished his Army career as a special assistant to the Director of the National Security Agency.

Information security key to digital era business models

Computer Weekly

Security will become increasingly important as industries seek to collaborate and use each other’s capabilities to enable new business models, with the banking sector leading the way

Interview: Nick Bleech, head of information security, Travis Perkins

Computer Weekly

Last year Travis Perkins implemented Splunk to help it to respond more quickly to security threats. Now, the business is looking into machine learning and a single customer view

Security Think Tank: Information security professionals have key role in GDPR compliance

Computer Weekly

What is the role of information security professionals in helping organisations to ensure they are compliant with the EU’s General Data Protection Regulation (GDPR) by 25 May 2018

2015 National Chief Information Security Officer Survey

Cloud Musings

Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO).

4 information security threats that will dominate 2017

Network World

Looking ahead to 2017, the Information Security Forum (ISF) , a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017. As with previous years, 2016 saw no shortage of data breaches.

Building The Language Bridge Between Security and the C-Suite

Forrester IT

If you had half an hour with a board member, and you wanted to get coaching from them about how to communicate with them about security, what would you ask them?

9 biggest information security threats through 2019

Network World

The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the Information Security Forum (ISF) — a nonprofit association that researches and analyzes security and risk management issues on behalf of its members — puts out its Threat Horizon report to provide members with a forward-looking view of the biggest security threats over a two-year period.

Cyber Catalyst Brings Minimal Value To Businesses

Forrester IT

cybersecurity information security Insurance security & risk CyberinsuranceIn late March, Marsh announced the launch of a program with a number of leading cyberinsurance firms including Allianz, AXA, Beazley, XL, and Zurich to evaluate cybersecurity products and services.

Examine The Cybersecurity Risk Ratings Market With The Forrester New Wave™ Evaluation

Forrester IT

The Forrester New Wave™: Cybersecurity Risk Ratings, Q4 2018 Earlier today, we published “The Forrester New Wave™: Cybersecurity Risk Ratings, Q4 2018” evaluation.

Automation For The Better Good - Security

Forrester IT

What these tasks have in common (in addition to relying on automation): a critical dependence on security. When you accept that jury duty request, you have faith that your PII (personally identifiable information) is being protected. In a world where infrastructure-as-code scales quickly and massively scales, it is crucial to bake in security at every level of the stack. Information Security. Security Operations & Program Governance.

Zero Trust Goes Mainstream In Europe

Forrester IT

In addition, general awareness of the Zero Trust security model is much lower in Europe than in the US. age of the customer information security network security security & risk security information & event management (SIEM) zero trust

Broken Processes Are The Biggest Cybersecurity Threat To Your Organization

Forrester IT

age of the customer cybersecurity privacy API security information security ransomware

Research Announcement Forrester Wave Q4 2019: European Cybersecurity Consulting Service Providers

Forrester IT

age of the customer Europe information securityWe are currently considering the list of vendor participants we are planning to invite to a pre-screener for the Q4 European Cybersecurity Consulting Service Provider Wave.

Software Defined Perimeter, Cloud Security Alliance: Coca-Cola Case Study

CTOvision

One of the many topics coved at the event was software defined perimeter and cloud security alliance. CTO Cyber Security News Video Bob Flores Chief information officer Chief information security officer CISO Coca-Cola Computer security Internet of Things Sierra Ventures

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

Chief Cyberinfrastructure Security Officer. Position Summary: The Internet2 Chief Cyberinfrastructure Security Officer (CCSO) is the leader responsible for establishing the cyberinfrastructure security strategy and direction for Internet2′s global infrastructure programs. The CCSO provides leadership for the Internet2 cyber security program through strong working relationships and collaboration across the staff and community, including policy and operational areas.

The 15 best cities for information security pay

Network World

High-flying salaries in some unexpected places Image by Greg Gjerdingen Before moving to this top city for InfoSec pay, you might want to read the latest John Sanford novel, brace for a bitter cold winter and develop a taste for tater tot hot dish.

Information Risk: Balancing the Good and Bad of Data Analytics

CEB IT

The former has opened up companies to new security risks while the latter has left some customers feeling uneasy about the privacy of their data. Poor security standards across an ecosystem can therefore have trickle down effects to your organization.

Your 2018 Guide To Cyberinsurance Is Here!

Forrester IT

Forrester’s 2018 Guide To Cyber Insurance Today, no one is 100% secure – believing otherwise is hubris of Icarian proportions. This reality is a core reason why more organizations are turning to cyber insurance.

Symantec Finally Agrees With Everyone Else In The Security Community: Says Antivirus Software Is Dead

CTOvision

But the hottest firms in cyber security, those growing because they make real, measurable, virtuous differences in enterprise security, are growing because they realized that Symantec''s core antivirus features just are not sufficient. Architecture CTO Cyber Security DoD and IC Research antivirus Computer security Fixmo Hexis Information security invincea Symantec Triumfant Wall Street Journal