Your Next Move: Chief Information Security Officer
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
IT Toolbox
JANUARY 23, 2024
An information security management system (ISMS) is a structured approach to protect data, manage risks, and ensure cybersecurity compliance. The post What Is an Information Security Management System (ISMS)? Meaning, Working, Benefits, and Best Practices appeared first on Spiceworks.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
IT Toolbox
DECEMBER 19, 2022
How can IT teams update their data resilience and upgrade their security strategy? The post Data Resilience Predictions: Using the Economy to Inform Security Strategy appeared first on.
Forrester IT
AUGUST 1, 2022
We’ve said it many times: security matters, and security leaders have more influence and access to boards and senior executives than ever. Thanks to external forces like ransomware attacks, evolving security and privacy legislation, and existential loss of cyber insurance dread, they get it at the top.
Association of Information Technology Professional
SEPTEMBER 2, 2022
Information security analyst Scott Krager left personal training and got into cybersecurity. Here’s how he did it.
CTOvision
JUNE 3, 2020
Read Joan Goodchild list 10 information security tips for companies during layoffs on Dark Reading: Business disruption and the financial toll brought on by the COVID-19 has forced many companies, […].
Tech Republic Security
JANUARY 23, 2024
This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees. The goal is to facilitate the security response and remediation process to ensure the least amount of potential damage to systems, networks, customers and business reputation.
Tech Republic Security
JANUARY 11, 2023
The post Explore information security with 97% off this huge course bundle appeared first on TechRepublic. The training covers Docker, Splunk and AWS as you work toward CCSP certification.
Tech Republic Security
MARCH 12, 2024
Information is the lifeblood of the business. Any given technological environment is useless if its main purpose for existence — the processing and sharing of information — is threatened or eliminated. Without it, employees can’t work, customers can’t interact with the business, bills can’t be paid and profits can’t be earned.
Information Week
JANUARY 12, 2022
Three technology jobs rank in the top 10 of U.S. News and World Report list of 2022 Best Jobs, evaluated on the basis of salary, work-life balance, and job outlook. Did your job make the list, and how does your salary compare to the median?
Social, Agile and Transformation
JULY 3, 2023
Some context: I rarely blog about information security because it’s outside my core expertise in digital transformation. It’s hard to drive transformation and also have a risk and security mindset, and it’s extraordinarily time-consuming to keep up with the latest security threats.
Forrester IT
MARCH 9, 2021
First off, I’d like to express how thrilled I am to join Forrester’s security and risk research (S&R) team as a senior analyst. I’ve been working closely with this team for eight years in my previous role as a principal advisor to our chief information security officer (CISO) community, and I’m honored to join the […].
CTOvision
MAY 5, 2014
Architecture CTO Cyber Security DoD and IC Research antivirus Computer security Fixmo Hexis Information security invincea Symantec Triumfant Wall Street Journal' The reality is that antivirus software that uses old fashioned methods of signature analysi. To read more please log in.
CTOvision
AUGUST 6, 2021
US cybersecurity startup Elevate Security (Elevate) has launched an attack surface management platform that uses a customized and automated response to employee risk throughout an organization to overcome the unaddressed problems caused due to human errors.
IT Toolbox
FEBRUARY 22, 2024
Learn how CISOs (chief information security officer) can leverage financial metrics to communicate cybersecurity success effectively to the board. The post 3 Metrics CISOs Should Present to the Board and How to Calculate Them appeared first on Spiceworks.
Information Week
AUGUST 24, 2023
It’s time for organizations -- their boards in particular -- to take the initiative to understand the cost of a security breach and the financial benefits of doing cybersecurity right.
CTOvision
JULY 29, 2020
Read why Praful Krishna says that information security challenges are proving to be a huge barrier for the artificial intelligence ecosystem on Dark Reading: Information security is all about keeping […].
Forrester IT
JUNE 8, 2017
Information Security. Security Operations & Program Governance. application security. In the end, you want I&O professionals to be policy enablers, not policy executors - automation helps get us there. Read more Categories: Development & Operations (DevOps). application management.
IT Toolbox
AUGUST 9, 2024
One of summer's top information security events, Black Hat 2024, ended on August 8. The post AI in Security, Microsoft Vulnerabilities, and More: Key Takeaways From Black Hat USA 2024 appeared first on Spiceworks Inc. The event comes at a time when AI affects everything from sports and politics to business and end consumers.
GeekWire
DECEMBER 8, 2023
Nordstrom Photo) — Nicole Ford joined Nordstrom as chief information security officer. Ford previously served as vice president and CISO at Rockwell Automation, with past experience leading security transformation initiatives and developing cybersecurity programs. Nicole Ford.
Forrester IT
MAY 11, 2017
I recently heard a segment on WBUR (a public radio station in Boston) on the emergence of microgrids and I was amazed at how much the concept of microgrids closely aligned with the concept of microperimeters within our Zero Trust model of information security.
Association of Information Technology Professional
FEBRUARY 19, 2021
Information security requires a specific set of skills. Arming your entire team with this knowledge is sure to equal success.
CTOvision
OCTOBER 17, 2018
The Chief Information Security Officer (CISO) of a company is becoming more and more important as cybersecurity threats increase in both frequency and reach.
Forrester IT
OCTOBER 3, 2018
After a very successful event last week in Washington, DC, our extended team of experts in information security, privacy, consumer behavior, and digital strategy is locking down the final details for Privacy & Security Forum Europe, which takes place in London on 9 and 10 October!
Information Week
DECEMBER 3, 2024
Over the past decade, the chief information security role has evolved from being a supporting position under the CIO or chief risk officer to a core member of the executive team.
Forrester IT
SEPTEMBER 23, 2024
One of the three principles of High-performance IT (HPIT) is to build trust on a foundation of security, privacy and resilience. As a CIO, executing your strategy will be much easier if you unleash the talent of the person who plays an outsized role in building a trusted business: your Chief Information Security Officer (CISO). […]
Forrester IT
NOVEMBER 8, 2016
On November 7, China's top legislature adopted a cybersecurity law to safeguard the sovereignty on cyberspace, national security, and the rights of citizens. Some critics, especially those in Europe and the United States, continue to read too much into the negative impact of this legislation.
Information Week
MARCH 6, 2024
The more information chief information security officers can uncover about their security and tech stack, the better off they will be.
Information Week
JULY 11, 2024
Chief information security officers need thorough recovery plans to ensure resilience and win the support of top execs. Recovering from a cyberattack is as important as defending against it.
Tech Republic Data Center
SEPTEMBER 22, 2020
Security is changing rapidly, and the COVID-19 pandemic hasn't helped. A Cisco roundtable of chief information security officer advisers plotted the course for a secure future.
Information Week
MARCH 14, 2024
Chief information security officers are on the job hunt. What should they be looking for in an offer?
Information Week
OCTOBER 11, 2023
Chief information security officers and chief information officers have distinct roles, but they share some common challenges.
Forrester IT
JULY 6, 2018
Sure, the brand failed to keep her information secure – but where they really failed was in their next […]. I recently heard a story where a loyalty program member of an online retailer had her account hacked. Hackers then went on a shopping spree and as a result, she lost a significant loss of money.
Information Week
JANUARY 3, 2023
Chief information security officers must develop a comprehensive security investment strategy that considers human capital, even while qualified IT security professionals are in short supply.
CTOvision
FEBRUARY 6, 2019
It’s been nearly ten years since John Kindervag first published a paper recommending what he called the “zero trust” model of information security. In the […].
Forrester IT
APRIL 6, 2022
The Scorsese classic has a few surprising parallels with today's chief information security officer.
Information Week
MAY 23, 2023
Inevitably, the chief information security officer role must adapt to keep up. Artificial intelligence arms both defenders and threat actors, rapidly reshaping the cybersecurity landscape.
Tech Republic Security
JUNE 21, 2024
Immersing yourself in best practices for ethical hacking, pen-testing and information security can set you up for a career or better-protected business.
Information Week
SEPTEMBER 26, 2024
New data shows chief information security officers are caught between unleashing AI’s productivity and securing against its threats.
Information Week
NOVEMBER 14, 2023
In today’s AI-based arms race between defenders and attackers, chief information security officers are facing challenges and embracing the promises of artificial intelligence.
Tech Republic Security
APRIL 11, 2024
Find the best open-source password managers to keep your sensitive information secure and easily accessible. Explore top options for protecting your passwords.
Social, Agile and Transformation
MAY 13, 2024
I’m a digital transformation, product, technology, and data/AI leader, but I don’t count information security as a top area of expertise. But when it comes to
CTOvision
DECEMBER 2, 2019
Read Pieter Danhieux list most dangerous software errors of 2019 on Information Security Buzz : The amazing community at MITRE recently published their list of the CWE Top 25 Most Dangerous Software Errors affecting the world in 2019.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content