Do You Really Need a CISO?

Cybersecurity has never been more challenging or vital. Every organization needs strong leadership on cybersecurity policy, procurement and execution — such as a CISO, or chief information security officer.  A CISO is a senior executive in charge of an organization’s information, cyber and technology security. CISOs need a complete understanding of cybersecurity as well as […]

The post Do You Really Need a CISO? appeared first on Security Intelligence.

Continue reading Do You Really Need a CISO?

The Role of Human Resources in Cybersecurity

The human resources (HR) department is an integral part of an organization. They work with all departments with a wider reach than even IT. As a highly visible department, HR can support and improve an organization’s security posture through employee training. Their access to employees at the start of employment is an opportunity to lay […]

The post The Role of Human Resources in Cybersecurity appeared first on Security Intelligence.

Continue reading The Role of Human Resources in Cybersecurity

The Role of Customer Service in Cybersecurity

The old adage “cybersecurity is everyone’s job” is more true than you might imagine. While not every department is tasked with threat hunting or reviewing detailed vulnerability disclosures, each has a role in protecting the organization from fraudsters and cyber criminals alike. Customer service is uniquely positioned as the face of the company. These departments […]

The post The Role of Customer Service in Cybersecurity appeared first on Security Intelligence.

Continue reading The Role of Customer Service in Cybersecurity

CEO, CIO or CFO: Who Should Your CISO Report To?

As we move deeper into a digitally dependent future, the growing concern of data breaches and other cyber threats has led to the rise of the Chief Information Security Officer (CISO). This position is essential in almost every company that relies on digital information. They are responsible for developing and implementing strategies to harden the […]

The post CEO, CIO or CFO: Who Should Your CISO Report To? appeared first on Security Intelligence.

Continue reading CEO, CIO or CFO: Who Should Your CISO Report To?

Why CISOs Shouldn’t Report to CIOs in the C-Suite

Cybersecurity plays a critical role in enterprises today. It has evolved from playing a fringe role to one that impacts every person in every business developed over the past 15 years. This shift will continue as we see not only more frequent attacks but also more devastating effects from cyber breaches. A critical change in […]

The post Why CISOs Shouldn’t Report to CIOs in the C-Suite appeared first on Security Intelligence.

Continue reading Why CISOs Shouldn’t Report to CIOs in the C-Suite

How Estonia Created Trust in Its Digital-Forward Government

Cities are becoming smarter every day, and many state and local governments are pushing towards the digitalization of public services. Some North American cities are working hard to integrate online services and manage cybersecurity risk at the same time. Meanwhile, perhaps the best example of a digital city is in fact a digital country.  The […]

The post How Estonia Created Trust in Its Digital-Forward Government appeared first on Security Intelligence.

Continue reading How Estonia Created Trust in Its Digital-Forward Government

How to Get on the CISO Certification Path

Cybersecurity workers are very proud of their certifications. Just check their email signatures for the alphabet of them: CISSP (certified information systems security professional), CISM (certified information security manager) and CCISO (certified chief information security officer) to name a few. But does every CISO need a CISO certification? And if you want to be a CISO, […]

The post How to Get on the CISO Certification Path appeared first on Security Intelligence.

Continue reading How to Get on the CISO Certification Path

Cloud Security Considerations to Watch Out for During Mergers and Acquisitions

Staying vigilant through each phase of a mergers and acquisitions (M&A) process can help businesses overcome cloud threats. Threat actors have hit victims during M&As in the past, such as the data breach that affected more than 500 million customers in 2018. Such cases force businesses to look into data exposure before and after M&As, […]

The post Cloud Security Considerations to Watch Out for During Mergers and Acquisitions appeared first on Security Intelligence.

Continue reading Cloud Security Considerations to Watch Out for During Mergers and Acquisitions

These Cybersecurity Trends Could Get a Boost in 2020

The events of early 2020 have prompted organizations to shift priorities across the board, and security processes are no exception. While the current working environment has presented numerous short-term challenges, it has also caused security leaders to take a fresh look at what really matters to their businesses. The cybersecurity trends that emerge could ultimately […]

The post These Cybersecurity Trends Could Get a Boost in 2020 appeared first on Security Intelligence.

Continue reading These Cybersecurity Trends Could Get a Boost in 2020

Effective Data Security Begins With a Strong Tech Foundation

When laying the foundation of your data security and privacy strategy, you will want to prioritize data-centric solutions and consider a Zero Trust approach to minimize risk and facilitate compliance.

The post Effective Data Security Begins With a Strong Tech Foundation appeared first on Security Intelligence.

Continue reading Effective Data Security Begins With a Strong Tech Foundation