10 Takeaways From the ISO 31000:2018 Risk Management Guidelines

The International Standards Organization (ISO) released an updated version of its risk management guidelines to help security leaders engage top leadership in cyber risk decision-making.

The post 10 Takeaways From the ISO 31000:2018 Risk Management Guidelines appeared first on Security Intelligence.

Continue reading 10 Takeaways From the ISO 31000:2018 Risk Management Guidelines

In Plain Sight: Why Military Veterans Are a Great Fit for Cybersecurity Careers

To help close the skills gap, IBM supported the launch of TechVets, a nonprofit organization dedicated to helping veterans and service leavers transition into cybersecurity careers.

The post In Plain Sight: Why Military Veterans Are a Great Fit for Cybersecurity Careers appeared first on Security Intelligence.

Continue reading In Plain Sight: Why Military Veterans Are a Great Fit for Cybersecurity Careers

Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer

To become an influencer within his or her organization, the security leader must effectively communicate with lines of business, engage with the board — and avoid abusing his or her veto power.

The post Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer appeared first on Security Intelligence.

Continue reading Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer

Signs That Your Security Program Is Going Nowhere Fast

Even if you have all the training, policies and technologies under the sun, your security program is useless if your organization lacks common goals and self-awareness about its defense capabilities.

The post Signs That Your Security Program Is Going Nowhere Fast appeared first on Security Intelligence.

Continue reading Signs That Your Security Program Is Going Nowhere Fast

When It Comes to Cyber Risks, 2018 Is No Time to Play Games

Security teams had best bring their A-game to compete against ever-more sophisticated threat actors as new cyber risks emerge and evolve in 2018.

The post When It Comes to Cyber Risks, 2018 Is No Time to Play Games appeared first on Security Intelligence.

Continue reading When It Comes to Cyber Risks, 2018 Is No Time to Play Games

Dr. Cole is in the House at IBM Think

When it comes to cybersecurity, companies today have so much to do and so much to focus on that they often do not have time to stop think about the longterm consquences of their policies.

The post Dr. Cole is in the House at IBM Think appeared first on Security Intelligence.

Continue reading Dr. Cole is in the House at IBM Think

Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

A data breach simulation is a great way to test your team’s crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.

The post Practicing Your Crisis Response: How Well Can You Handle Right of Boom? appeared first on Security Intelligence.

Continue reading Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

SEC Releases Updated Guidance For Cybersecurity Disclosure

The SEC released updated guidance regarding cybersecurity disclosure for public companies, emphasizing the responsibility of executives to report material risks and incidents.

The post SEC Releases Updated Guidance For Cybersecurity Disclosure appeared first on Security Intelligence.

Continue reading SEC Releases Updated Guidance For Cybersecurity Disclosure

SEC Releases Updated Guidance For Cybersecurity Disclosure

The SEC released updated guidance regarding cybersecurity disclosure for public companies, emphasizing the responsibility of executives to report material risks and incidents.

The post SEC Releases Updated Guidance For Cybersecurity Disclosure appeared first on Security Intelligence.

Continue reading SEC Releases Updated Guidance For Cybersecurity Disclosure

Listen to Your Cassandras to Avoid Cybersecurity Disasters

Instead of dismissing experts who warn of impending cybersecurity disasters, business leaders should thoroughly investigate the issue at hand and prepare a response to minimize the potential damage.

The post Listen to Your Cassandras to Avoid Cybersecurity Disasters appeared first on Security Intelligence.

Continue reading Listen to Your Cassandras to Avoid Cybersecurity Disasters