National IT Professionals Day: Recognizing the Saintly Patience of IT Workers

CISOs should take a moment to recognize the hard work, patience and resilience of their staffers on National IT Professionals Day.

The post National IT Professionals Day: Recognizing the Saintly Patience of IT Workers appeared first on Security Intelligence.

Continue reading National IT Professionals Day: Recognizing the Saintly Patience of IT Workers

No Time for Techno-Babble: Four Key Traits of Quality CISO Reports

CISO reports must clearly illustrate how cybersecurity relates to business objectives in a way that board directors can understand.

The post No Time for Techno-Babble: Four Key Traits of Quality CISO Reports appeared first on Security Intelligence.

Continue reading No Time for Techno-Babble: Four Key Traits of Quality CISO Reports

The New CISO: Management Through Thought Leadership

The CISO can positively impact both organizational security and his or her own professional brand through thought leadership.

The post The New CISO: Management Through Thought Leadership appeared first on Security Intelligence.

Continue reading The New CISO: Management Through Thought Leadership

Money Talks: Speaking the Language of Money to Boost Security Awareness Among CEOs

CEOs often lack security awareness because IT professionals fail to communicate risks in the context of the organization’s bottom line.

The post Money Talks: Speaking the Language of Money to Boost Security Awareness Among CEOs appeared first on Security Intelligence.

Continue reading Money Talks: Speaking the Language of Money to Boost Security Awareness Among CEOs

Keep Intruders Out of Your Network With Proactive Threat Hunting

Threat hunting promotes a proactive approach to security monitoring and incident response, making it harder for intruders to breach your network.

The post Keep Intruders Out of Your Network With Proactive Threat Hunting appeared first on Security Intelligence.

Continue reading Keep Intruders Out of Your Network With Proactive Threat Hunting

Testing Top Leadership’s Muscle Memory With Data Breach Simulations

Just like security analysts, top executives need data breach training to develop the skills required to carry out an effective incident response strategy.

The post Testing Top Leadership’s Muscle Memory With Data Breach Simulations appeared first on Security Intelligence.

Continue reading Testing Top Leadership’s Muscle Memory With Data Breach Simulations

Succession Planning: The Importance of a Deputy CISO

To ensure a smooth transfer of security power, organizations should establish a definitive plan to appoint and develop a deputy CISO.

The post Succession Planning: The Importance of a Deputy CISO appeared first on Security Intelligence.

Continue reading Succession Planning: The Importance of a Deputy CISO

Simplifying Malware Analysis for the C-Suite and Security Operations

IBM X-Force Malware Analysis on Cloud is a SaaS solution that helps analysts identify malware and shorten the time to remediate a potential infection.

The post Simplifying Malware Analysis for the C-Suite and Security Operations appeared first on Security Intelligence.

Continue reading Simplifying Malware Analysis for the C-Suite and Security Operations

Building an Effective CISO-CIO Partnership

For an organization’s security program to thrive, the CISO and CIO must be on the same page when it comes to implementations and budgetary concerns.

The post Building an Effective CISO-CIO Partnership appeared first on Security Intelligence.

Continue reading Building an Effective CISO-CIO Partnership