The Inconvenient Reality of Law Firm Security Challenges

Organizations that take an IT-centric approach to law firm security risk exposing sensitive data to malicious actors and damaging client trust.

The post The Inconvenient Reality of Law Firm Security Challenges appeared first on Security Intelligence.

Continue reading The Inconvenient Reality of Law Firm Security Challenges

The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader

The role of the security leader is expanding, and CISOs must posses strong communication skills, extensive technical knowledge, analytical minds and the respect of their peers to be successful.

The post The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader appeared first on Security Intelligence.

Continue reading The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader

What Can We Learn From the World Economic Forum’s Cyber Resilience Playbook

The WEF’s “Cyber Resilience: Playbook for Public-Private Collaboration” aims to help governments align security policies with key values and promote collaboration both within and across borders.

The post What Can We Learn From the World Economic Forum’s Cyber Resilience Playbook appeared first on Security Intelligence.

Continue reading What Can We Learn From the World Economic Forum’s Cyber Resilience Playbook

Highlights From the World Economic Forum’s ‘Global Risks Report 2018’

The World Economic Forum’s “Global Risks Report 2018” warned of “the increased dangers of systemic breakdown” due to our overreliance on emerging technologies for critical systems and services.

The post Highlights From the World Economic Forum’s ‘Global Risks Report 2018’ appeared first on Security Intelligence.

Continue reading Highlights From the World Economic Forum’s ‘Global Risks Report 2018’

Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Take a look at some traits from the famous “Star Wars” characters we’ve grown to love and explore how those might be applicable to CISOs today.

The post Is Your CISO a Jedi Warrior, an Admiral or a Diplomat? appeared first on Security Intelligence.

Continue reading Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Take a look at some traits from the famous “Star Wars” characters we’ve grown to love and explore how those might be applicable to CISOs today.

The post Is Your CISO a Jedi Warrior, an Admiral or a Diplomat? appeared first on Security Intelligence.

Continue reading Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens?

By proactively determining who is responsible for data risk management before a data breach occurs, C-suite executives can help avoid such incidents in the first place.

The post Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens? appeared first on Security Intelligence.

Continue reading Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens?

Increasing Security Preparedness and Awareness Among Board Members and Top Management

To increase security preparedness and awareness among executives, CISOs need to communicate cyber risks in business terms and regularly assess their systems for vulnerabilities.

The post Increasing Security Preparedness and Awareness Among Board Members and Top Management appeared first on Security Intelligence.

Continue reading Increasing Security Preparedness and Awareness Among Board Members and Top Management

Four Key Lessons From NACD’s ‘2018 Governance Outlook’ About Managing Cyber Risks

The National Association of Corporate Directors (NACD)’s “2018 Governance Outlook: Projections on Emerging Board Matters” offered key advice to help board directors engage with cyber risk management.

The post Four Key Lessons From NACD’s ‘2018 Governance Outlook’ About Managing Cyber Risks appeared first on Security Intelligence.

Continue reading Four Key Lessons From NACD’s ‘2018 Governance Outlook’ About Managing Cyber Risks

Where the CISO Should Sit on the Security Org Chart and Why It Matters

The CISO’s position on the security org chart influences the nature and frequency of interactions the security leader will have other executives — not to mention the security budget.

The post Where the CISO Should Sit on the Security Org Chart and Why It Matters appeared first on Security Intelligence.

Continue reading Where the CISO Should Sit on the Security Org Chart and Why It Matters