The Enterprise Imperative: Five Tips for Improving Incident Response

According to IBM’s Christopher Scott, who spoke at The Wall Street Journal’s Pro Cybersecurity Executive Forum, the road to better incident response is “a marathon, not a sprint.”

The post The Enterprise Imperative: Five Tips for Improving Incident Response appeared first on Security Intelligence.

Continue reading The Enterprise Imperative: Five Tips for Improving Incident Response

No Place For Passivity in Cybersecurity Leadership

Many organizations lack the cybersecurity leadership required to effectively defend their networks and proactively respond to data breaches when they do occur.

The post No Place For Passivity in Cybersecurity Leadership appeared first on Security Intelligence.

Continue reading No Place For Passivity in Cybersecurity Leadership

Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018

CISOs can improve their enterprise security posture by adopting cognitive technology, educating executives, conducting incident response training and fostering a culture of security in 2018.

The post Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018 appeared first on Security Intelligence.

Continue reading Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018

Security’s Time Management Crunch and How to Solve It

It seems like there’s never enough hours in the day for security professionals, but effective time management can positively impact your security posture in unimaginable ways.

The post Security’s Time Management Crunch and How to Solve It appeared first on Security Intelligence.

Continue reading Security’s Time Management Crunch and How to Solve It

Transform Your Security Strategy to Avoid Digital Roadblocks

To transform your security strategy, you must first establish a model of shared responsibility between security professionals and business units throughout the organization.

The post Transform Your Security Strategy to Avoid Digital Roadblocks appeared first on Security Intelligence.

Continue reading Transform Your Security Strategy to Avoid Digital Roadblocks

Long Road Ahead or Unbridgeable Chasm? Lessons From the EY ‘Global Information Security Survey’

The EY “Global Infomation Security Survey” revealed that CISOs and executives have a long road ahead when it comes to improving communication — but it is indeed a road, not an unbridgeable chasm.

The post Long Road Ahead or Unbridgeable Chasm? Lessons From the EY ‘Global Information Security Survey’ appeared first on Security Intelligence.

Continue reading Long Road Ahead or Unbridgeable Chasm? Lessons From the EY ‘Global Information Security Survey’

Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges

Organizations that follow both the COSO enterprise risk management framework and the NIST CSF can vastly improve their cyber risk oversight and management.

The post Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges appeared first on Security Intelligence.

Continue reading Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges

Things to Consider When Calculating the Return on Security Investment

The return on security investment is a crucial calculation to help CISOs demonstrate risks in business terms and gain executive buy-in for security tools.

The post Things to Consider When Calculating the Return on Security Investment appeared first on Security Intelligence.

Continue reading Things to Consider When Calculating the Return on Security Investment

The Benefits of Operational Risk Management

Operational risk management can help organizations measure the cost of network security solutions versus the cost of a potential data breach.

The post The Benefits of Operational Risk Management appeared first on Security Intelligence.

Continue reading The Benefits of Operational Risk Management

What Does Secure Digital Transformation Mean to You?

A secure digital transformation requires open lines of communication and collaboration between line of business executives and security leaders.

The post What Does Secure Digital Transformation Mean to You? appeared first on Security Intelligence.

Continue reading What Does Secure Digital Transformation Mean to You?