Is the Security Community Out of Touch?

Instead of waiting for industry giants to take the lead, the security community should encourage dialogue and collaborate to create a security framework.

The post Is the Security Community Out of Touch? appeared first on Security Intelligence.

Continue reading Is the Security Community Out of Touch?

It’s Not Too Late: Take Back Control of Your Cybersecurity Now

“Take Back Control of Your Cybersecurity Now,” the new e-book by Paul Ferrillo and Chris Veltsos, is an invaluable resource for nontechnical professionals.

The post It’s Not Too Late: Take Back Control of Your Cybersecurity Now appeared first on Security Intelligence.

Continue reading It’s Not Too Late: Take Back Control of Your Cybersecurity Now

How Should You Communicate With Your Senior Management Team?

IT professionals must consider the motivations and concerns of senior management when communicating about security issues and refrain from using jargon.

The post How Should You Communicate With Your Senior Management Team? appeared first on Security Intelligence.

Continue reading How Should You Communicate With Your Senior Management Team?

How Should You Communicate With Your Senior Management Team?

IT professionals must consider the motivations and concerns of senior management when communicating about security issues and refrain from using jargon.

The post How Should You Communicate With Your Senior Management Team? appeared first on Security Intelligence.

Continue reading How Should You Communicate With Your Senior Management Team?

CISO Complexity: A Role More Daunting Than Ever

Given the growing number of compliance requirements and advanced threats security leaders must deal with, CISO complexity is at an all-time high.

The post CISO Complexity: A Role More Daunting Than Ever appeared first on Security Intelligence.

Continue reading CISO Complexity: A Role More Daunting Than Ever

Why Your Enterprise Security Strategy Needs to Evolve

A good security strategy must constantly evolve and adapt to current threats, new protective tools and burgeoning vulnerabilities.

The post Why Your Enterprise Security Strategy Needs to Evolve appeared first on Security Intelligence.

Continue reading Why Your Enterprise Security Strategy Needs to Evolve

The CISO as a Digital Trust Diplomat

As digital trust diplomats, CISOs must be tactful in their negotiations and should able to influence colleagues and superiors.

The post The CISO as a Digital Trust Diplomat appeared first on Security Intelligence.

Continue reading The CISO as a Digital Trust Diplomat

Five Ways to Improve the CISO-Board Relationship

As cyberthreats grow in numbers and complexity, the future of cybersecurity increasingly depends on an open, trusting CISO-board relationship.

The post Five Ways to Improve the CISO-Board Relationship appeared first on Security Intelligence.

Continue reading Five Ways to Improve the CISO-Board Relationship

CISOs Are Constantly Confronted With Conflicts of Interest

Companies and individuals may throw ethics out the window when there’s an extra buck to be made. CISOs must learn to nip conflicts of interest in the bud.

The post CISOs Are Constantly Confronted With Conflicts of Interest appeared first on Security Intelligence.

Continue reading CISOs Are Constantly Confronted With Conflicts of Interest

Building a Cybersecurity Culture Around Layer 8

IT leaders must develop a strong cybersecurity culture to promote awareness and accountability, and to empower employees to learn and develop.

The post Building a Cybersecurity Culture Around Layer 8 appeared first on Security Intelligence.

Continue reading Building a Cybersecurity Culture Around Layer 8