Understanding the difference between cybersecurity crisis management and security incident response could be critical to your organization's survival. In this blog, a CISO offers insights on creating an effective crisis management plan.
Healthcare organizations must adopt a "wartime" mindset against their sophisticated, persistent attackers. But how can CISOs lead the way in developing an effective security action plan designed for the current threat environment?
In this session, experienced healthcare CISOs will:
Provide real-world insights on...
Same-day Automated Clearing House (ACH) payment processing became a reality. While this represents a terrific opportunity for banks to be responsive to their customer's requirements for faster ACH payments, plus the ability to attract new customers from banks who choose not to offer the same level of responsiveness,...
Cloud computing has already led to a fundamental shift in the enterprise computing paradigm, and security now needs to follow, says Gartner's Steve Riley, who shares recommendations.
As pressure to speed the development of applications intensifies, CISOs must be the "voice of reason," taking a leadership role in ensuring security issues are addressed early in app development process, says John Dickson, principal at Denim Group, a Texas-based security consultancy.
A roundup of the just-concluded ISMG Fraud and Breach Prevention in Toronto leads the latest edition of the ISMG Security Report. Also, how one CISO gets his security message across to the board and the challenges CISOs face during their first 100 days on the job.
The massive Sony breach spelled out the risks facing any business that deals in digital content. Here's how David Hahn, CISO of publishing giant Hearst, keeps the cybersecurity conversation going with his board of directors.
An analysis of U.S. Republican presidential candidate Donald Trump's understanding of cybersecurity leads the latest edition of the ISMG Security Report. Also, the U.S. federal government gets its first chief information security officer.
The first 100 days on the job can be daunting for security leaders as they work toward understanding the organization's posture, while at the same time defending it around the clock. Gartner's Tom Scholtz shares insights on meeting key milestones.
President Obama has named Gregory Touhill, a retired Air Force brigadier general, as the U.S. federal government's first CISO. But his tenure could be brief because the next president could replace him or do away with the new position.
The way the U.S. federal government funds information technology served as a major contributor to last year's breach of computers at the Office of Personnel Management that exposed 21.5 million records, says Federal Chief Information Officer Tony Scott.
Many organizations take months or years to discover they've been victimized by breaches because they lack experienced cybersecurity personnel, says employment researcher David Foote. The "maturing of the workforce" will take considerable time, he says in an interview.
Sam Lodhi, director at niche services firm IBRS, speaks about adapting biological cybernetics to help management understand information security risk better and how cybernetics can be applied to other verticals.
Vikrant Arora, CISO of NYC Health & Hospitals, offers the four most important questions a board must ask the CISO to get a good understanding of how the organization is addressing top cybersecurity concerns.
To facilitate faster decision-making, better cost control and increased transparency, many organizations now task a single executive to oversee all security, privacy and risk functions, says ADP's Roland Cloutier.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.