Your Next Move: Chief Information Security Officer
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
Network World
DECEMBER 30, 2016
Looking ahead to 2017, the Information Security Forum (ISF) , a global, independent information security body that focuses on cyber security and information risk management, forecasts businesses will face four key global security threats in 2017.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Network World
APRIL 26, 2017
But for organizations still maturing their defensive measures, here’s what the transformation of cyber crime into an industry means for how you approach information security. To read this article in full or to leave a comment, please click here
Network World
NOVEMBER 15, 2021
(Enterprise Management Associates finds that enterprises are trying to improve collaboration between their network-infrastructure and operations teams and their information-security and cybersecurity teams. To read this article in full, please click here
Network World
FEBRUARY 15, 2017
The responsibilities of information security are rapidly changing as enterprises digitize. Digitization has spurred three company-wide shifts, creating the need for three associated new information security roles. Information security increasingly plays a larger role in advising business partners on strategy.
Network World
FEBRUARY 19, 2019
The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. How edge computing can help secure the IoT.
Network World
DECEMBER 13, 2022
Hackers understand that backup servers are often under-protected and administered by junior personnel that are less well versed in information security. To read this article in full, please click here And it seems no one wants to do something about it lest they become the new backup expert responsible for the server.
Network World
APRIL 25, 2017
There are two times you might have to talk to your organization’s board of directors about security: before a breach and after. That should mean the board wants to talk with you, the CISO, to learn firsthand what your department is doing to mitigate information security threats.
Network World
MARCH 28, 2017
The information security threat landscape is constantly evolving. But that dependence makes them vulnerable to attacks on core internet infrastructure, devices used in daily business and key people with access to mission-critical information. To read this article in full or to leave a comment, please click here
Network World
NOVEMBER 28, 2016
Emphasize that information security applies to all agencies. Ideally, a cabinet meeting for all new secretaries should be held within three months of the inauguration to underscore that information security is essential for all agencies to complete their missions.
CTOvision
OCTOBER 28, 2014
One of the many topics coved at the event was software defined perimeter and cloud security alliance. Related articles. On September 30 th Sierra Ventures hosted their 9th CIO summit in Palo Alto, CA. Coca-Cola was used as a case study. Alan Boehme , the acting CISO at Coca-Cola. Watch the recorded presentation here. legalzoom.com).
CTOvision
APRIL 21, 2014
Our site CISOtech.com is a repository of articles and information of interest to enterprise security professionals. Any reporting we do here at CTOvision that has relevance for the CISO is archived at that site, plus evaluations on cyber security technologies of interest. By Bob Gourley.
Network World
APRIL 11, 2017
Career Tracker: What it takes to be a chief information security officer. Jeff Foltz did not set out to be an information security professional. To read this article in full or to leave a comment, please click here (Insider Story)
Network World
MARCH 1, 2016
Application security is arguably the biggest cyber threat , responsible for 90 percent of security incidents, according to the Department of Homeland Security. To read this article in full or to leave a comment, please click here (Insider Story)
Network World
MARCH 1, 2017
Information security is forever weaved into our daily lives. From the massive data breaches impacting Target, Yahoo and Anthem to IoT-powered DDoS attacks that take down substantial portions of the internet for extended periods of time, information security impacts everyone.
CTOvision
MARCH 30, 2015
The 10th Cyber & Information Security Research (CISR) Conference, 7-9 April 2015, will be held at the Conference Center, 2nd Floor, Building 5200, Oak Ridge National Laboratory, Oak Ridge, Tennessee. Related articles. Cyber Security and the Data Protection Act (acunetix.com). Reception is free. April 08, 2015.
Social, Agile and Transformation
JULY 3, 2023
Some context: I rarely blog about information security because it’s outside my core expertise in digital transformation. It’s hard to drive transformation and also have a risk and security mindset, and it’s extraordinarily time-consuming to keep up with the latest security threats.
Network World
FEBRUARY 19, 2019
The problem of edge security isn’t unique – many of the issues being dealt with are the same ones that have been facing the general IT sector for decades. Yet, by applying basic information security precautions, most edge deployments can be substantially safer. How edge computing can help secure the IoT.
Network World
APRIL 19, 2021
“The [main treatment] plant was built [about] 15 years ago,” said Kristen Sanders, the authority’s chief information security officer. “So To read this article in full, please click here So if a piece of equipment went out, replacing it would be about shopping on eBay.”
Network World
MARCH 19, 2017
Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year. To read this article in full or to leave a comment, please click here
CTOvision
AUGUST 11, 2014
Major breaches in the last year at large companies like Target and eBay have made information security discussions more worrying and more widespread, albeit still not universally understood. A Tweet from Jeffrey Carr, a cybersecurity guru quoted by Mr. Yardon, echoed the articles title.
Network World
OCTOBER 20, 2023
Roughly 80% of CIOs reported that they plan to increase spending on cyber/information security in 2024, according to Gartner's 2024 CIO and Technology Executive Survey. To read this article in full, please click here Cybersecurity spending is also driving growth in the software segment.
Network World
MAY 23, 2017
With information security being a major concern at all companies, successful security executives need to be equally comfortable in the boardroom and the server room. These skills are consistently mentioned by CEOs and CSOs when we’re discussing how business and security leaders can work better together.
Network World
AUGUST 4, 2016
To read this article in full or to leave a comment, please click here (Insider Story) High-flying salaries in some unexpected places Image by Greg Gjerdingen Before moving to this top city for InfoSec pay, you might want to read the latest John Sanford novel, brace for a bitter cold winter and develop a taste for tater tot hot dish.
Galido
FEBRUARY 25, 2020
Information Technology Blog - - The Small Business Guide to Information Security - Information Technology Blog. Information security is a major issue in the business world, and security breaches cost businesses millions of dollars per year. But they can be particularly disastrous to small businesses.
Network World
DECEMBER 29, 2016
The high-water line in information security gets higher each year. To read this article in full or to leave a comment, please click here Just as we think we’ve finally figured out how to defend against attacks, then attackers come up with something new and we are right back to trying to figure out what to do next.
Network World
JULY 1, 2016
With so many elements in information security -- application, network infrastructure, the endpoint, perimeter defenses, and data-centric approaches -- it's easy to fall in the trap of touting one as more important than the other. That overlap is most evident with application and endpoint security.
CTOvision
OCTOBER 20, 2014
With Edward Snowden’s revelations, the myriad of recent information breaches at large corporations, and the extraordinary level of digitalization in our country, the American public has never placed a higher value on cyber security. CTOVision covered the story here. Good Luck with That.” The FBI is wrong about device encryption.
Network World
MARCH 29, 2017
To read this article in full or to leave a comment, please click here Machine learning , the most prominent subset of AI, is about recognizing patterns in data and computer learning from them like a human. These algorithms draw inferences without being explicitly programmed to do so.
CTOvision
JUNE 20, 2014
The urgency of improving information security cannot be understated. Since the widely publicized attack on Target Corporation, data breaches have become increasingly common – sensitive information stored with both eBay and the California Department of Motor Vehicles has been compromised in the last six months alone.
Network World
MAY 26, 2016
The two major international security agencies in Europe agree that building backdoors into encryption platforms is not the best way to secure systems because of the collateral damage it would do to privacy and the security of communications. To read this article in full or to leave a comment, please click here
Network World
MARCH 13, 2017
This article on W-2 scams sprung from a conversation I had with my colleague Steve Williams, who ended up being my co-author. Multiple times each year, LinkedIn feeds and information security forums light up with examples of the latest and greatest versions of phishing attacks. Check out more about him at the end of this piece.
CTOvision
AUGUST 21, 2014
Yep, the article points to an interview that Michael Daniel gave to GovInfoSecurity.com in which cites him: Michael Daniel sees his lack of technical expertise in IT security as an asset in his job as White House cybersecurity coordinator. Couldn’t be. I had to read on.
SecureWorld News
NOVEMBER 25, 2024
I just wrapped up a management review for our cybersecurity program (which is called an Information Security Management System (ISMS) in ISO 27001), and it got me thinking about how valuable these reviews are—not just for meeting compliance requirements like ISO 27001, but for driving real improvements in how we approach cybersecurity.
Network World
SEPTEMBER 21, 2016
Are you taking on multiple job responsibilities at your company, including some aspects of information security? At many organizations, IT professionals are being asked to handle a variety of security tasks and functions. Download the State of Information Security research report ]. If so, you’re not alone.
Network World
AUGUST 18, 2016
But you don't expect such proactive practices from an enterprise's information security team, which a CIO often enlists to place a moat around corporate assets. Mike Bartholomy, Western Union's senior manager for information security. To read this article in full or to leave a comment, please click here
Network World
MARCH 22, 2017
Internal threats Image by Thinkstock Last year was the worst on record for information security incidents, and the majority of those were due to inside sources, many studies agree. Prime suspects are employees and contractors with privileged user access, says Sam Elliott, director of security product management at Bomgar.
Network World
FEBRUARY 1, 2017
Two officers of the Russian Federal Security Service (FSB) and a cybercrime investigator from Kaspersky Lab have reportedly been charged with treason for helping U.S. To read this article in full or to leave a comment, please click here intelligence services.
Network World
DECEMBER 22, 2016
There are more free information security tools out there than you can highlight with a fist full of whiteboard pointers. A few important categories include threat intelligence tools, tools to build security in during the development stage, penetration testers, and forensics tools. threat exchanges.
Network World
JUNE 8, 2017
Each and every day, it seems, the tech community wakes up to news of another attack on data security and privacy. As IT professionals, we spend our days working to the best of our knowledge and ability to keep company information secure. To read this article in full or to leave a comment, please click here
Network World
MAY 31, 2016
Employees are often considered the weakest link in organizations' efforts to create a strong security posture. Even organizations with security awareness programs in place struggle to instill strong security behaviors. To read this article in full or to leave a comment, please click here
Network World
SEPTEMBER 15, 2016
Stiff competition for talent and a limited pool of security specialists make information security staffing a perennial challenge. Complicating this is the fact that security has not yet adapted to its changing role as organizations digitize. To read this article in full or to leave a comment, please click here
Network World
DECEMBER 20, 2016
Security jobs Image by Thinkstock Information technology budgets are not expected to grow substantially in the New Year, but one area where organizations continue to invest is in information security. To read this article in full or to leave a comment, please click here (Insider Story)
CTOvision
FEBRUARY 20, 2014
Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. Bigman worked in every area of information and data security, the last fifteen years as the Agency’s Chief Information Security Officer (CISO).
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content