As Cyber Risk Escalates, the C-Suite Must Take Action

As long as C-suite executives believe that cybersecurity is an IT issue, they will remain disengaged from the solutions and their role in supporting a robust cyber risk management strategy.

The post As Cyber Risk Escalates, the C-Suite Must Take Action appeared first on Security Intelligence.

Continue reading As Cyber Risk Escalates, the C-Suite Must Take Action

Social Engineering: A Trick as Old as Time

Social engineering dates back to ancient times. Today, the most common forms of social trickery include baiting, vishing, phishing and other schemes designed to exploit human nature.

The post Social Engineering: A Trick as Old as Time appeared first on Security Intelligence.

Continue reading Social Engineering: A Trick as Old as Time

Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer

To become an influencer within his or her organization, the security leader must effectively communicate with lines of business, engage with the board — and avoid abusing his or her veto power.

The post Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer appeared first on Security Intelligence.

Continue reading Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer

Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

A data breach simulation is a great way to test your team’s crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.

The post Practicing Your Crisis Response: How Well Can You Handle Right of Boom? appeared first on Security Intelligence.

Continue reading Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

SEC Releases Updated Guidance For Cybersecurity Disclosure

The SEC released updated guidance regarding cybersecurity disclosure for public companies, emphasizing the responsibility of executives to report material risks and incidents.

The post SEC Releases Updated Guidance For Cybersecurity Disclosure appeared first on Security Intelligence.

Continue reading SEC Releases Updated Guidance For Cybersecurity Disclosure

SEC Releases Updated Guidance For Cybersecurity Disclosure

The SEC released updated guidance regarding cybersecurity disclosure for public companies, emphasizing the responsibility of executives to report material risks and incidents.

The post SEC Releases Updated Guidance For Cybersecurity Disclosure appeared first on Security Intelligence.

Continue reading SEC Releases Updated Guidance For Cybersecurity Disclosure

Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert

According to IBM cyber risk expert Tim Roberts, security professionals must do a better job of communicating with top management as the technology landscape evolves and new threats emerge.

The post Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert appeared first on Security Intelligence.

Continue reading Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert

5 Ways to Reduce Cybersecurity Risk and Win Over Your CEO and CTO

In today’s always-connected world it’s important to realize that, historically and traditionally, cybersecurity was the responsibility of the IT department. Any time a cyberincident or data breach occurred or security questions arose, these got deferre… Continue reading 5 Ways to Reduce Cybersecurity Risk and Win Over Your CEO and CTO

The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader

The role of the security leader is expanding, and CISOs must posses strong communication skills, extensive technical knowledge, analytical minds and the respect of their peers to be successful.

The post The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader appeared first on Security Intelligence.

Continue reading The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader

Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens?

By proactively determining who is responsible for data risk management before a data breach occurs, C-suite executives can help avoid such incidents in the first place.

The post Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens? appeared first on Security Intelligence.

Continue reading Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens?