article thumbnail

10 Tips for Maintaining Information Security During Layoffs

CTOvision

Read Joan Goodchild list 10 information security tips for companies during layoffs on Dark Reading: Business disruption and the financial toll brought on by the COVID-19 has forced many companies, […].

article thumbnail

3 Metrics CISOs Should Present to the Board and How to Calculate Them

IT Toolbox

Learn how CISOs (chief information security officer) can leverage financial metrics to communicate cybersecurity success effectively to the board. The post 3 Metrics CISOs Should Present to the Board and How to Calculate Them appeared first on Spiceworks.

How To 303
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Catelas: Next-Generation ‘Relationship Forensics’ Software

CTOvision

Catelas is used for Legal (Early Case Intelligence & Identification), Compliance (Supervision in Financial Services and 3rd party Compliance & Risk Oversigh. Analytical Tool Companies Company Catelas FCPA Financial Services Information security' To read more please log in. . .

Software 275
article thumbnail

How Financial Insights Inform Security Strategies

Information Week

It’s time for organizations -- their boards in particular -- to take the initiative to understand the cost of a security breach and the financial benefits of doing cybersecurity right.

article thumbnail

Financial institutions need to rethink security, say analysts

Computer Weekly

Financial services providers need to rethink their approach to information security, according to the results of a global survey

Financial 139
article thumbnail

Red Owl Analytics: Enabling information security and compliance teams to proactively tackle insider risk

CTOvision

We do this by ingesting communications, digital activity, physical access, and financial transactions into one platform to provide a holistic view of an individual, applying advanced mathematics to model and proactively identify risky behavior before it becomes a security or compliance headache.

article thumbnail

Internet Two Seeks Chief Cyberinfrastructure Security Officer

CTOvision

Bachelor’s Degree in Computer Science, Information Systems, Business, or related field or equivalent work experience. Minimum of 10 years of progressive experience in the network security and information security policy workforce. Click here to apply online. All applications will be held in the strictest confidence.

Security 293