Stressed to Impress: Evolving Threats Raise the Stakes on Shared Security Culture

Shared security culture is now critical for organizations to prevent IT burnout and respond to emerging threats. But what does this look like in practice?

The post Stressed to Impress: Evolving Threats Raise the Stakes on Shared Security Culture appeared first on Security Intelligence.

Continue reading Stressed to Impress: Evolving Threats Raise the Stakes on Shared Security Culture

The Language of Business: Where the Board of Directors and Security Leaders Can Meet

IT and security professionals must be able to talk business to the C-suite and the board of directors, especially if new security products need to be added into the organization’s portfolio.

The post The Language of Business: Where the Board of Directors and Security Leaders Can Meet appeared first on Security Intelligence.

Continue reading The Language of Business: Where the Board of Directors and Security Leaders Can Meet

Failure to Plan: 3 Unexpected Security Challenges That Undermine Your CISO

The role of a chief information security officer (CISO) can never be categorized as low-stress. After all, the responsibility for safeguarding all that corporate, customer and employee data, along with intellectual property, is so vast and the pressur… Continue reading Failure to Plan: 3 Unexpected Security Challenges That Undermine Your CISO

Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns

Chief information security officers (CISOs) are looking for ways to set the tone for the year and have more engaged conversations with top leadership regarding cybersecurity risks.

The post Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns appeared first on Security Intelligence.

Continue reading Manage Emerging Cybersecurity Risks by Rallying Around Mutual Concerns

Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

Researchers have discovered evidence of a threat group named London Blue, a U.K.-based collective that focuses on CFOs at mortgage companies, accounting firms and some of the world’s largest banks.

The post Why You Should Be Worried About London Blue’s Business Email Compromise Attacks appeared first on Security Intelligence.

Continue reading Why You Should Be Worried About London Blue’s Business Email Compromise Attacks

Security Boulevard Exclusive Series: What I Learned About Being a CISO After I Stopped Being a CISO

Make no bones about it, running enterprise cybersecurity and IT risk management as a chief information security officer (CISO) is not for the faint of heart. It’s a tough gig prone to stress, burnout and involuntary, sacrificial “resignati… Continue reading Security Boulevard Exclusive Series: What I Learned About Being a CISO After I Stopped Being a CISO

To Err is Human: Cybersecurity Training Your Employees

As we come to the end of cyber security month – we must admit to ourselves that to err is human. You can employ the latest technology at your company to bolster defenses but you cannot always keep employees from making stupid and unintentional mi… Continue reading To Err is Human: Cybersecurity Training Your Employees

Data Risk Management: Circling the Wagons With Three Chief Officers Leading the Way

To establish a consolidated data risk management program, the chief information security officer (CISO), chief data officer (CDO) and chief risk officer (CRO) must be on the same page.

The post Data Risk Management: Circling the Wagons With Three Chief Officers Leading the Way appeared first on Security Intelligence.

Continue reading Data Risk Management: Circling the Wagons With Three Chief Officers Leading the Way

The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation

In today’s rapidly evolving security environment, it’s imperative for organizations to establish a formal data risk management program that does more than just check the boxes.

The post The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation appeared first on Security Intelligence.

Continue reading The Wild West of Data Risk Management in the Age of Cloud, Mobile and Digital Transformation