How to Win at Cyber by Influencing People

November 5, 2024 at 10:14AM Implementing zero trust is a complex, ongoing process focused on validating every connection in IT and security. Key steps include fostering organizational partnerships, aligning stakeholders, communicating risk effectively to boards, planning phased deployments, ensuring pragmatic technical deliverables, and addressing basic cybersecurity practices to strengthen security culture. ### Meeting Takeaways on … Read more

Developer Velocity & Security: Can You Get Out of the Way in Time?

November 1, 2024 at 10:05AM CIOs are increasing software investments to enhance productivity, while CISOs face challenges in keeping up with rapid changes and integrating security into development processes. To improve collaboration, security must be embedded in developers’ workflows, allowing for faster output without hindering productivity, thus promoting a secure-by-design methodology that addresses risks effectively. … Read more

What’s the Future Path for CISOs?

May 7, 2024 at 04:39PM The CISO role is changing, with many aspiring to become CIOs or CTOs. Renee Guttmann-Stark mentors such transitions, though she herself prefers focusing on cybersecurity. Some CISOs, like Jamil Farschi of Equifax, are moving into CTO roles. Challenges persist, including job vacancies and handling relentless cyber attacks. The rise of … Read more

What’s the Future Path for CISOs?

May 7, 2024 at 04:24PM Renee Guttmann-Stark, a former CISO, acknowledges the trend of CISOs transitioning to CTO roles, citing examples like Jamil Farschi’s promotion. Challenges facing CISOs include job vacancies, insurance issues, and tool procurement. Guttmann-Stark advocates for AI deployment in automating tasks. She also emphasizes the importance of CISOs gaining proficiency in AI … Read more

CISO Corner: CIO Convergence, 10 Critical Security Metrics, & Ivanti Fallout

February 16, 2024 at 07:12PM “CISO Corner” offers curated articles for security operations and leadership. It covers topics such as security metrics, convergence of CISO & CIO roles, FCC’s new breach reporting rules, budget trends in the Middle East & Africa, and concerns about Ivanti VPN vulnerabilities. For detailed information, visit Dark Reading’s website. From … Read more

Threat Prevention Begins With IT & Security Team Collaboration

November 2, 2023 at 10:04AM The responsibility for cybersecurity in businesses has expanded beyond security teams. As cyber threats continue to evolve, business leaders are restructuring their leadership teams to prioritize cybersecurity. Collaboration between IT and security teams is crucial for preventing cyber threats and maintaining productivity. Communication, collaboration on security strategies, and securing remote … Read more

By proceeding you understand and give your consent that your IP address and browser information might be processed by the security plugins installed on this site.
×