CISOs drive the intersection between cyber maturity and business continuity

The modern corporate landscape is marked by rapid digital change, heightened cybersecurity threats and an evolving regulatory environment. At the nexus of these pressures sits the chief information security officer (CISO), a role that has gained newfound influence and responsibility. The recent Deloitte Global Future of Cyber Survey underscores this shift, revealing that “being more […]

The post CISOs drive the intersection between cyber maturity and business continuity appeared first on Security Intelligence.

Continue reading CISOs drive the intersection between cyber maturity and business continuity

CISO vs. CEO: Making a case for cybersecurity investments

Ask CISOs why they think there is a cyber skills shortage in their organization, what keeps them up at night or what the most important issue facing the industry is — at some point, even if not the first response, they will bring up budgets. For example, at RSA Conference 2024, a roundtable discussion about […]

The post CISO vs. CEO: Making a case for cybersecurity investments appeared first on Security Intelligence.

Continue reading CISO vs. CEO: Making a case for cybersecurity investments

CISOs list human error as their top cybersecurity risk

With cybersecurity, the focus often is on technology — specifically, how cyber criminals use it to conduct attacks and the tools that organizations can use to keep their systems and data safe. However, this overlooks the most important element in cybersecurity risk: human error. Human risk in cybersecurity Proofpoint’s 2024 Voice of the CISO report […]

The post CISOs list human error as their top cybersecurity risk appeared first on Security Intelligence.

Continue reading CISOs list human error as their top cybersecurity risk

The evolution of a CISO: How the role has changed

In many organizations, the Chief Information Security Officer (CISO) focuses mainly — and sometimes exclusively — on cybersecurity. However, with today’s sophisticated threats and evolving threat landscape, businesses are shifting many roles’ responsibilities, and expanding the CISO’s role is at the forefront of those changes. According to Gartner, regulatory pressure and attack surface expansion will […]

The post The evolution of a CISO: How the role has changed appeared first on Security Intelligence.

Continue reading The evolution of a CISO: How the role has changed

Boardroom cyber expertise comes under scrutiny

Why are companies concerned about cybersecurity? Some of the main drivers are data protection, compliance, risk management and ensuring business continuity. None of these are minor issues. Then why do board members frequently keep their distance when it comes to cyber concerns? A report released last year showed that just 5% of CISOs reported directly […]

The post Boardroom cyber expertise comes under scrutiny appeared first on Security Intelligence.

Continue reading Boardroom cyber expertise comes under scrutiny

The CISO’s guide to accelerating quantum-safe readiness

Quantum computing presents both opportunities and challenges for the modern enterprise. While quantum computers are expected to help solve some of the world’s most complex problems, they also pose a risk to traditional cryptographic systems, particularly public-key encryption. To ensure their organization’s data remains secure now and in the future, chief information security officers (CISOs) […]

The post The CISO’s guide to accelerating quantum-safe readiness appeared first on Security Intelligence.

Continue reading The CISO’s guide to accelerating quantum-safe readiness

Operationalize cyber risk quantification for smart security

Organizations constantly face new tactics from cyber criminals who aim to compromise their most valuable assets. Yet despite evolving techniques, many security leaders still rely on subjective terms, such as low, medium and high, to communicate and manage cyber risk. These vague terms do not convey the necessary detail or insight to produce actionable outcomes […]

The post Operationalize cyber risk quantification for smart security appeared first on Security Intelligence.

Continue reading Operationalize cyber risk quantification for smart security

Empowering cybersecurity leadership: Strategies for effective Board engagement

With the increased regulation surrounding cyberattacks, more and more executives are seeing these attacks for what they are – serious threats to business operations, profitability and business survivability. But what about the Board of Directors? Are they getting all the information they need? Are they aware of your organization’s cybersecurity initiatives? Do they understand why […]

The post Empowering cybersecurity leadership: Strategies for effective Board engagement appeared first on Security Intelligence.

Continue reading Empowering cybersecurity leadership: Strategies for effective Board engagement

Healthcare breach costs soar requiring new thinking for safeguarding data

In the digital age, data is often referred to as the new oil. Its value lies in the insights it can yield, particularly when it comes to healthcare, where data can help detect diseases, predict patient outcomes and help health professionals personalize treatments. But with the increasing digitization of sensitive health information, there are legitimate […]

The post Healthcare breach costs soar requiring new thinking for safeguarding data appeared first on Security Intelligence.

Continue reading Healthcare breach costs soar requiring new thinking for safeguarding data

Healthcare breach costs soar requiring new thinking for safeguarding data

In the digital age, data is often referred to as the new oil. Its value lies in the insights it can yield, particularly when it comes to healthcare, where data can help detect diseases, predict patient outcomes and help health professionals personalize treatments. But with the increasing digitization of sensitive health information, there are legitimate […]

The post Healthcare breach costs soar requiring new thinking for safeguarding data appeared first on Security Intelligence.

Continue reading Healthcare breach costs soar requiring new thinking for safeguarding data