Your Next Move: Chief Information Security Officer
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Association of Information Technology Professional
SEPTEMBER 9, 2020
This article details the necessary experience and education needed for a career as a chief information security officer.
Forrester IT
AUGUST 1, 2022
We’ve said it many times: security matters, and security leaders have more influence and access to boards and senior executives than ever. Thanks to external forces like ransomware attacks, evolving security and privacy legislation, and existential loss of cyber insurance dread, they get it at the top.
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
IT Toolbox
DECEMBER 19, 2022
How can IT teams update their data resilience and upgrade their security strategy? The post Data Resilience Predictions: Using the Economy to Inform Security Strategy appeared first on.
IT Toolbox
JANUARY 23, 2024
An information security management system (ISMS) is a structured approach to protect data, manage risks, and ensure cybersecurity compliance. The post What Is an Information Security Management System (ISMS)? Meaning, Working, Benefits, and Best Practices appeared first on Spiceworks.
CTOvision
AUGUST 6, 2021
US cybersecurity startup Elevate Security (Elevate) has launched an attack surface management platform that uses a customized and automated response to employee risk throughout an organization to overcome the unaddressed problems caused due to human errors.
Association of Information Technology Professional
SEPTEMBER 2, 2022
Information security analyst Scott Krager left personal training and got into cybersecurity. Here’s how he did it.
CTOvision
JUNE 3, 2020
Read Joan Goodchild list 10 information security tips for companies during layoffs on Dark Reading: Business disruption and the financial toll brought on by the COVID-19 has forced many companies, […].
CTOvision
MAY 5, 2014
But the hottest firms in cyber security, those growing because they make real, measurable, virtuous differences in enterprise security, are growing because they realized that Symantec''s core antivirus features just are not sufficient. The reality is that antivirus software that uses old fashioned methods of signature analysi.
Tech Republic Security
JANUARY 23, 2024
This policy from TechRepublic Premium provides guidelines for the reporting of information security incidents by company employees. The goal is to facilitate the security response and remediation process to ensure the least amount of potential damage to systems, networks, customers and business reputation.
Forrester IT
JUNE 8, 2017
What these tasks have in common (in addition to relying on automation): a critical dependence on security. When you accept that jury duty request, you have faith that your PII (personally identifiable information) is being protected. Information Security. Security Operations & Program Governance.
Tech Republic Security
JANUARY 11, 2023
The post Explore information security with 97% off this huge course bundle appeared first on TechRepublic. The training covers Docker, Splunk and AWS as you work toward CCSP certification.
Tech Republic Security
MARCH 12, 2024
Information is the lifeblood of the business. Any given technological environment is useless if its main purpose for existence — the processing and sharing of information — is threatened or eliminated. Without it, employees can’t work, customers can’t interact with the business, bills can’t be paid and profits can’t be earned.
IT Toolbox
AUGUST 9, 2024
One of summer's top information security events, Black Hat 2024, ended on August 8. The post AI in Security, Microsoft Vulnerabilities, and More: Key Takeaways From Black Hat USA 2024 appeared first on Spiceworks Inc. The event comes at a time when AI affects everything from sports and politics to business and end consumers.
Information Week
JANUARY 12, 2022
Three technology jobs rank in the top 10 of U.S. News and World Report list of 2022 Best Jobs, evaluated on the basis of salary, work-life balance, and job outlook. Did your job make the list, and how does your salary compare to the median?
Forrester IT
MARCH 9, 2021
First off, I’d like to express how thrilled I am to join Forrester’s security and risk research (S&R) team as a senior analyst. I’ve been working closely with this team for eight years in my previous role as a principal advisor to our chief information security officer (CISO) community, and I’m honored to join the […].
Social, Agile and Transformation
JULY 3, 2023
Some context: I rarely blog about information security because it’s outside my core expertise in digital transformation. It’s hard to drive transformation and also have a risk and security mindset, and it’s extraordinarily time-consuming to keep up with the latest security threats.
Association of Information Technology Professional
FEBRUARY 19, 2021
Information security requires a specific set of skills. Arming your entire team with this knowledge is sure to equal success.
CTOvision
MARCH 25, 2020
Johnson explain how SaaS companies can secure customer data on Help Net Security : Recently, some of the biggest names in SaaS have experienced customer support data breaches. Read Robert C.
Forrester IT
OCTOBER 3, 2018
After a very successful event last week in Washington, DC, our extended team of experts in information security, privacy, consumer behavior, and digital strategy is locking down the final details for Privacy & Security Forum Europe, which takes place in London on 9 and 10 October!
Forrester IT
JANUARY 14, 2019
Venture capital and private equity spending on security technology reached an all-time high in 2018. While that total may pale in comparison to other fast-growing markets such as fintech ($124B) or transportation tech ($150B), consider that 65% of that $31B in security has […].
Information Week
JANUARY 3, 2023
Chief information security officers must develop a comprehensive security investment strategy that considers human capital, even while qualified IT security professionals are in short supply.
CTOvision
FEBRUARY 6, 2019
It’s been nearly ten years since John Kindervag first published a paper recommending what he called the “zero trust” model of information security. In the […].
Tech Republic Data Center
SEPTEMBER 22, 2020
Security is changing rapidly, and the COVID-19 pandemic hasn't helped. A Cisco roundtable of chief information security officer advisers plotted the course for a secure future.
Forrester IT
MARCH 25, 2019
Today we released our 2019 Security & Risk Recommendations report. We collected contributions from our colleagues across the Forrester Security & Risk team to identify the most important actions security leaders should take in 2019. Security leaders have earned board level visibility, […].
IT Toolbox
FEBRUARY 22, 2024
Learn how CISOs (chief information security officer) can leverage financial metrics to communicate cybersecurity success effectively to the board. The post 3 Metrics CISOs Should Present to the Board and How to Calculate Them appeared first on Spiceworks.
Social, Agile and Transformation
MAY 13, 2024
I’m a digital transformation, product, technology, and data/AI leader, but I don’t count information security as a top area of expertise. But when it comes to
Forrester IT
MAY 11, 2017
I recently heard a segment on WBUR (a public radio station in Boston) on the emergence of microgrids and I was amazed at how much the concept of microgrids closely aligned with the concept of microperimeters within our Zero Trust model of information security.
Information Week
AUGUST 24, 2023
It’s time for organizations -- their boards in particular -- to take the initiative to understand the cost of a security breach and the financial benefits of doing cybersecurity right.
Forrester IT
APRIL 6, 2022
The Scorsese classic has a few surprising parallels with today's chief information security officer.
Forrester IT
DECEMBER 15, 2020
Security vendors spend all their time talking about security, but not in a way that’s useful […]. The intrusion into SolarWinds, FireEye, and multiple US Government agencies continues to roil the cybersecurity world.
Network World
NOVEMBER 15, 2021
(Enterprise Management Associates finds that enterprises are trying to improve collaboration between their network-infrastructure and operations teams and their information-security and cybersecurity teams.
Forrester IT
NOVEMBER 2, 2022
But that doesn’t mean that it should all be dismissed as nonsense, especially when it comes to information security. Even the most innocuous posts somehow manage to offend or anger someone out there on the internet. News of critical vulnerabilities, dangerous exploits, breaches, […].
CTOvision
JULY 29, 2020
Read why Praful Krishna says that information security challenges are proving to be a huge barrier for the artificial intelligence ecosystem on Dark Reading: Information security is all about keeping […].
CTOvision
OCTOBER 14, 2020
Read Rob Acker explain what ISO 27001 certification is and how it will help your organization on Infosec Magazine: Organizations adjusting to remote working are facing unprecedented information security challenges. […].
Forrester IT
NOVEMBER 8, 2016
On November 7, China's top legislature adopted a cybersecurity law to safeguard the sovereignty on cyberspace, national security, and the rights of citizens. I believe that it's the reasonable move for the Chinese government to make in order to balance national security, citizen privacy, and economic openness. security.
GeekWire
DECEMBER 8, 2023
(Nordstrom Photo) — Nicole Ford joined Nordstrom as chief information security officer. Ford previously served as vice president and CISO at Rockwell Automation, with past experience leading security transformation initiatives and developing cybersecurity programs.
CTOvision
OCTOBER 17, 2018
The Chief Information Security Officer (CISO) of a company is becoming more and more important as cybersecurity threats increase in both frequency and reach.
CTOvision
AUGUST 21, 2014
Yep, the article points to an interview that Michael Daniel gave to GovInfoSecurity.com in which cites him: Michael Daniel sees his lack of technical expertise in IT security as an asset in his job as White House cybersecurity coordinator. And I’ll be the first to tell you there is no such thing as a person who masters every nuance.
Forrester IT
SEPTEMBER 23, 2024
One of the three principles of High-performance IT (HPIT) is to build trust on a foundation of security, privacy and resilience. As a CIO, executing your strategy will be much easier if you unleash the talent of the person who plays an outsized role in building a trusted business: your Chief Information Security Officer (CISO). […]
Forrester IT
AUGUST 21, 2019
As an industry, we gripe about hiring and struggle with retention. My colleagues Jeff, Chase, and JB have written about how the cybersecurity staffing shortage is predominantly self-inflicted in hiring practices, while Stephanie and Claire have written about best practices for recruiting and retaining women in cybersecurity. What’s Next?
Tech Republic Security
MARCH 19, 2023
PURPOSE The purpose of this Security Response Policy from TechRepublic Premium is to outline the security incident response processes which must be followed. The post Security response policy appeared first on TechRepublic. It includes requirements for both.
Forrester IT
JUNE 8, 2018
If you had half an hour with a board member, and you wanted to get coaching from them about how to communicate with them about security, what would you ask them? In a few weeks’ time, I will have just that opportunity when I facilitate a panel with some prominent board directors. Getting inside the […].
CIO Business Intelligence
JUNE 2, 2022
Information security has been an intriguing part of our past, is a critical part of our present, and will be a defining factor in our future. The economics of security are clear: “There is no financial stability without cybersecurity,” writes Loretta J. To have a future requires mastering information security.
Information Week
MARCH 6, 2024
The more information chief information security officers can uncover about their security and tech stack, the better off they will be.
Expert insights. Personalized for you.
We have resent the email to
Are you sure you want to cancel your subscriptions?
Let's personalize your content