Your Next Move: Chief Information Security Officer
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
Network World
DECEMBER 30, 2016
Looking ahead to 2017, the Information Security Forum (ISF) , a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Network World
APRIL 26, 2017
But for organizations still maturing their defensive measures, here’s what the transformation of cyber crime into an industry means for how you approach information security. To read this article in full or to leave a comment, please click here
Network World
FEBRUARY 15, 2017
The responsibilities of information security are rapidly changing as enterprises digitize. Digitization has spurred three company-wide shifts, creating the need for three associated new information security roles. Information security increasingly plays a larger role in advising business partners on strategy.
Network World
NOVEMBER 15, 2021
(Enterprise Management Associates finds that enterprises are trying to improve collaboration between their network-infrastructure and operations teams and their information-security and cybersecurity teams. To read this article in full, please click here
Network World
DECEMBER 13, 2022
Hackers understand that backup servers are often under-protected and administered by junior personnel that are less well versed in information security. To read this article in full, please click here And it seems no one wants to do something about it lest they become the new backup expert responsible for the server.
Network World
MARCH 28, 2017
The information security threat landscape is constantly evolving. But that dependence makes them vulnerable to attacks on core internet infrastructure, devices used in daily business and key people with access to mission-critical information. To read this article in full or to leave a comment, please click here
Network World
NOVEMBER 28, 2016
Emphasize that information security applies to all agencies. Ideally, a cabinet meeting for all new secretaries should be held within three months of the inauguration to underscore that information security is essential for all agencies to complete their missions.
Network World
APRIL 11, 2017
Career Tracker: What it takes to be a chief information security officer. Jeff Foltz did not set out to be an information security professional. To read this article in full or to leave a comment, please click here (Insider Story)
Network World
MARCH 1, 2017
Information security is forever weaved into our daily lives. From the massive data breaches impacting Target, Yahoo and Anthem to IoT-powered DDoS attacks that take down substantial portions of the internet for extended periods of time, information security impacts everyone.
Social, Agile and Transformation
JULY 3, 2023
Some context: I rarely blog about information security because it’s outside my core expertise in digital transformation. It’s hard to drive transformation and also have a risk and security mindset, and it’s extraordinarily time-consuming to keep up with the latest security threats.
CTOvision
MARCH 30, 2015
The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Related articles. Cyber Security and the Data Protection Act (acunetix.com). By Charles Hall. April 08, 2015.
Network World
APRIL 19, 2021
“The [main treatment] plant was built [about] 15 years ago,” said Kristen Sanders, the authority’s chief information security officer. “So To read this article in full, please click here So if a piece of equipment went out, replacing it would be about shopping on eBay.”
CTOvision
AUGUST 11, 2014
Major breaches in the last year at large companies like Target and eBay have made information security discussions more worrying and more widespread, albeit still not universally understood. A Tweet from Jeffrey Carr, a cybersecurity guru quoted by Mr. Yardon, echoed the articles title.
Network World
OCTOBER 20, 2023
Roughly 80% of CIOs reported that they plan to increase spending on cyber/information security in 2024, according to Gartner's 2024 CIO and Technology Executive Survey. To read this article in full, please click here Cybersecurity spending is also driving growth in the software segment.
Network World
FEBRUARY 19, 2019
The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. To read this article in full, please click here (Insider Story)
Network World
AUGUST 4, 2016
To read this article in full or to leave a comment, please click here (Insider Story) High-flying salaries in some unexpected places Image by Greg Gjerdingen Before moving to this top city for InfoSec pay, you might want to read the latest John Sanford novel, brace for a bitter cold winter and develop a taste for tater tot hot dish.
Network World
MARCH 29, 2017
To read this article in full or to leave a comment, please click here Machine learning , the most prominent subset of AI, is about recognizing patterns in data and computer learning from them like a human. These algorithms draw inferences without being explicitly programmed to do so.
Galido
FEBRUARY 25, 2020
Information Technology Blog - - The Small Business Guide to Information Security - Information Technology Blog. Information security is a major issue in the business world, and security breaches cost businesses millions of dollars per year. But they can be particularly disastrous to small businesses.
Network World
MARCH 13, 2017
This article on W-2 scams sprung from a conversation I had with my colleague Steve Williams, who ended up being my co-author. Multiple times each year, LinkedIn feeds and information security forums light up with examples of the latest and greatest versions of phishing attacks. Check out more about him at the end of this piece.
CTOvision
OCTOBER 28, 2014
Related articles. CTO Cyber Security News Video Bob Flores Chief information officer Chief information security officer CISO Coca-Cola Computer security Internet of Things Sierra Ventures' Watch the recorded presentation here. Next Steps for the Cybersecurity Framework (vormetric.com). legalzoom.com).
Network World
APRIL 25, 2017
That should mean the board wants to talk with you, the CISO, to learn firsthand what your department is doing to mitigate information security threats. A scorecard or checklist can be an effective visual and a good starting point for a discussion of the organization’s security measures.
CTOvision
APRIL 21, 2014
Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. By Bob Gourley.
Network World
JULY 1, 2016
With so many elements in information security -- application, network infrastructure, the endpoint, perimeter defenses, and data-centric approaches -- it's easy to fall in the trap of touting one as more important than the other. To read this article in full or to leave a comment, please click here
CTOvision
OCTOBER 20, 2014
This sentiment is echoed in a recent article by The Washington Post, “FBI Director Calls on Congress to Stop Unlockable Encryption. And the article is not an outlier, as many online articles express similar disagreement with the director. Good Luck with That.” My piece @WIRED : [link] #ComeyCrypto. Comey Privacy'
Network World
MAY 26, 2016
To read this article in full or to leave a comment, please click here
CTOvision
JUNE 20, 2014
The urgency of improving information security cannot be understated. Since the widely publicized attack on Target Corporation, data breaches have become increasingly common – sensitive information stored with both eBay and the California Department of Motor Vehicles has been compromised in the last six months alone.
Network World
MARCH 1, 2016
Yet it suffers from not-my-job syndrome, or, as SANS put it in its 2015 State of Application Security report, "Many information security engineers don’t understand software development — and most software developers don’t understand security."
Network World
JUNE 8, 2017
As IT professionals, we spend our days working to the best of our knowledge and ability to keep company information secure. To read this article in full or to leave a comment, please click here Some days, however, when news of new attacks hit, it can feel like we’ll never get ahead.
Network World
FEBRUARY 19, 2019
The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. To read this article in full, please click here (Insider Story)
Network World
MARCH 19, 2017
In addition to encrypting communications and data stored on the device, the new SecuSuite also secures voice calls using the SNS standard set by Germany's Federal Office for Information Security (BSI). To read this article in full or to leave a comment, please click here
SecureWorld News
NOVEMBER 25, 2024
I just wrapped up a management review for our cybersecurity program (which is called an Information Security Management System (ISMS) in ISO 27001), and it got me thinking about how valuable these reviews are—not just for meeting compliance requirements like ISO 27001, but for driving real improvements in how we approach cybersecurity.
CTOvision
AUGUST 21, 2014
Yep, the article points to an interview that Michael Daniel gave to GovInfoSecurity.com in which cites him: Michael Daniel sees his lack of technical expertise in IT security as an asset in his job as White House cybersecurity coordinator. Couldn’t be. I had to read on.
Network World
MAY 23, 2017
With information security being a major concern at all companies, successful security executives need to be equally comfortable in the boardroom and the server room. These skills are consistently mentioned by CEOs and CSOs when we’re discussing how business and security leaders can work better together.
Network World
DECEMBER 29, 2016
The high-water line in information security gets higher each year. To read this article in full or to leave a comment, please click here Just as we think we’ve finally figured out how to defend against attacks, then attackers come up with something new and we are right back to trying to figure out what to do next.
CTOvision
DECEMBER 5, 2014
Information Security is everyone’s business – The ever increasing “zero day” attacks will drive Information Security and Cyber Industries from today’s predictive and reactive toward proactive and containment solutions. Related articles. Learn more at www.intellidyne-llc.com.
Network World
OCTOBER 3, 2016
The bad guys responded to those inquiries and pointed users to the fake site where they would ask for, and sometimes receive, personal and account information – an attack called angler phishing. To read this article in full or to leave a comment, please click here
Network World
NOVEMBER 9, 2016
There are two primary issues related to security and robotics, says Michael Overly, a partner and information security attorney at law firm Foley & Lardner. To read this article in full or to leave a comment, please click here An attack could literally bring a manufacturing or assembly plant to its knees,” he says.
CTOvision
FEBRUARY 20, 2014
Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Bigman worked in every area of information and data security, the last fifteen years as the Agency’s Chief Information Security Officer (CISO).
Cloud Musings
FEBRUARY 4, 2015
Recent cases have highlighted identity theft, the loss of personal financial data, and the disclosure of sensitive national security information. The executive in the hot seat for preventing these failures is the Chief Information Security Officer (CISO). Grab this Headline Animator ( Thank you.
Network World
SEPTEMBER 21, 2016
Are you taking on multiple job responsibilities at your company, including some aspects of information security? At many organizations, IT professionals are being asked to handle a variety of security tasks and functions. Download the State of Information Security research report ]. If so, you’re not alone.
Network World
APRIL 18, 2017
The top three results were as follows: 43% said “reducing costs,” 40% said “increasing productivity," and 39% said “improving information security.” . Allow me to provide a bit of analysis to this data (after all, I am an industry analyst): To read this article in full or to leave a comment, please click here
Network World
AUGUST 18, 2016
But you don't expect such proactive practices from an enterprise's information security team, which a CIO often enlists to place a moat around corporate assets. Mike Bartholomy, Western Union's senior manager for information security. To read this article in full or to leave a comment, please click here
Network World
FEBRUARY 1, 2017
The arrests of Ruslan Stoyanov, the head of the computer incidents investigation team at Kaspersky, and Sergei Mikhailov, the deputy head of the Information Security Center at the FSB, happened in early December and were reported in the Russian media last week. To read this article in full or to leave a comment, please click here
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content