CISO May 28, 2015 As Data Breach Costs Soar, Boards of Directors Must Get Involved 3 min read - The "2015 Cost of Data Breach Study: Global Analysis" showed that the financial and operational consequences of a data breach are quite significant.
CISO May 14, 2015 Take Notes: How the Academic World Can Inform Security 4 min read - Experts from the academic world provided information that could contribute to business solutions as part of a study by the IBM Center for Applied Insights.
May 11, 2015 New SAP Vulnerabilities Create Sticky Situation for IT Security 2 min read - New SAP vulnerabilities could pose a serious problem for IT security professionals; despite its ubiquity, SAP is often overlooked as a security risk.
CISO April 14, 2015 RSA Conference: Six Must-Attend Sessions for CISOs 3 min read - If you are a CISO attending the RSA Conference 2015, check out these top educational sessions that can help you improve your role and responsibilities.
Banking & Finance April 8, 2015 Data Security Requires a Symbiotic Relationship Between the CFO, CIO and CISO 2 min read - As more and more data security incidents have cropped up in recent years, the CFO, CIO and CISO must work together to manage risk to their company.
CISO March 17, 2015 Self-Improvement Agenda for CISOs: Communicating the Business Value of Security 4 min read - When conveying the business value of security, CISOs must remember that awareness isn't understanding, silence isn't approval and some metrics don't work.
CISO March 9, 2015 Self-Improvement Agenda for CISOs: Four Types of Business Value, Two Types of Risk 5 min read - Risk management doesn't always get the investment it deserves, often because security and IT professionals misinterpret their objectives for the company.
CISO March 2, 2015 Self-Improvement Agenda for CISOs: What Is Top of Mind for 2015? 3 min read - At the NG Security U.S. Summit in December 2014, participants discussed the need for CISOs to have a self-improvement agenda for 2015.
Intelligence & Analytics February 9, 2015 How to Create Impact With Your Information Security Report in the Boardroom 3 min read - When creating an information security report as a CISO, it is important to appeal to the needs of the decision-making executives in the boardroom.
CISO February 5, 2015 The Evolving CISO Policy Role 2 min read - More attention is being focused on the evolving role of the CISO, who must now provide technical knowledge and help shape security policies.