CISO July 6, 2017 Succession Planning: The Importance of a Deputy CISO 3 min read - To ensure a smooth transfer of security power, organizations should establish a definitive plan to appoint and develop a deputy CISO.
CISO June 28, 2017 Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks 4 min read - Security leaders must translate their technical expertise into business insights when communicating cyber risks to executives and board directors.
CISO June 19, 2017 Cyber Solstice: IT Security Tasks to Tackle on the Longest Day of the Year 3 min read - Security professionals should take advantage of the longest day of the year to take care of security tasks that are typically placed on the back burner.
CISO June 6, 2017 Avoiding Security Hype, the Hazard From Hollywood 2 min read - Unfortunately, the Hollywood approach of security hype doesn't do much to help organizations improve their actual security.
Endpoint June 5, 2017 Four Key Considerations for Managing Your IoT Population 3 min read - To effectively manage your IoT population, you must understand where your devices are, what they do, who is using them and how they connect to the network.
Risk Management June 5, 2017 Security Awareness: How to Make Your Weakest Link Part of Your Defense 2 min read - A well-aligned, orchestrated security awareness program can help IT leaders strengthen the weakest link in any security program: users.
CISO June 2, 2017 Information Security in the Age of Disinformation 3 min read - With so much disinformation being reported in the news and spread through social media, it's hard for security professionals to know what to believe.
CISO May 30, 2017 Four New Cyberthreats on the CISO’s Radar 2 min read - An effective defense against cyberattacks such as ransomware, dronejacking and hacktivism requires a deep understanding of the evolving threat landscape.
Incident Response May 30, 2017 When a Cyber Crisis Hits, Know Your OODA Loops 4 min read - OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.
May 26, 2017 Survey: IT Leaders Concerned About Mobile Workforce Security Challenges 2 min read - A survey revealed that IT leaders are struggling to strike a healthy balance between the benefits and security risks associated with a mobile workforce.