When a Cyber Crisis Hits, Know Your OODA Loops

OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.

The post When a Cyber Crisis Hits, Know Your OODA Loops appeared first on Security Intelligence.

Continue reading When a Cyber Crisis Hits, Know Your OODA Loops

Don’t Sit Back and Wait for Security Risks to Disappear

Many IT leaders and executives simply accept security risks as a result of poor decisions based on fear, misinformation and flawed insights.

The post Don’t Sit Back and Wait for Security Risks to Disappear appeared first on Security Intelligence.

Continue reading Don’t Sit Back and Wait for Security Risks to Disappear

Cybersecurity Leadership in Transition: A View From the Classroom

Cybersecurity leadership courses traditionally focus on imparting subject matter expertise, but the next generation of CISOs must also be trusted advisors.

The post Cybersecurity Leadership in Transition: A View From the Classroom appeared first on Security Intelligence.

Continue reading Cybersecurity Leadership in Transition: A View From the Classroom

Who Is Responsible for IoT Security?

As the Internet of Things grows and mobile devices become increasingly connected, the security community must define who is responsible for IoT security.

The post Who Is Responsible for IoT Security? appeared first on Security Intelligence.

Continue reading Who Is Responsible for IoT Security?

Building an Effective CISO-CIO Partnership

For an organization’s security program to thrive, the CISO and CIO must be on the same page when it comes to implementations and budgetary concerns.

The post Building an Effective CISO-CIO Partnership appeared first on Security Intelligence.

Continue reading Building an Effective CISO-CIO Partnership

How to Hire Your Next CISO

Hiring a CISO is more about finding gaps, committing to new ideas and bringing those ideas to life than it is about finding the right person for the job.

The post How to Hire Your Next CISO appeared first on Security Intelligence.

Continue reading How to Hire Your Next CISO

Top Reasons You Need to Be Thinking About the Psychology of Security

Insights into the psychology of security can help IT professionals get executives and employees on board with security initiatives and best practices.

The post Top Reasons You Need to Be Thinking About the Psychology of Security appeared first on Security Intelligence.

Continue reading Top Reasons You Need to Be Thinking About the Psychology of Security

How The Next-Generation CISO Will Lead Security Strategy

The next-generation CISO must take charge of board meetings to spread awareness among executives of the crucial link between security and business goals.

The post How The Next-Generation CISO Will Lead Security Strategy appeared first on Security Intelligence.

Continue reading How The Next-Generation CISO Will Lead Security Strategy

Signs That You’re About to Suffer a Security Breach

Security leaders must communicate effectively with executives and monitor users for signs that the organization is about to suffer a security breach.

The post Signs That You’re About to Suffer a Security Breach appeared first on Security Intelligence.

Continue reading Signs That You’re About to Suffer a Security Breach