10 Takeaways From the ISO 31000:2018 Risk Management Guidelines

The International Standards Organization (ISO) released an updated version of its risk management guidelines to help security leaders engage top leadership in cyber risk decision-making.

The post 10 Takeaways From the ISO 31000:2018 Risk Management Guidelines appeared first on Security Intelligence.

Continue reading 10 Takeaways From the ISO 31000:2018 Risk Management Guidelines

Five Steps for Investigating and Responding to Employee Fraud

In the rush to deflect blame in the wake of an insider attack, many organizations fail to answer critical questions that could help them avoid similar cases of employee fraud in the future.

The post Five Steps for Investigating and Responding to Employee Fraud appeared first on Security Intelligence.

Continue reading Five Steps for Investigating and Responding to Employee Fraud

Failure to Communicate Critical Data Risk to Business Leaders Can Have Perilous Consequences

To avoid the disastrous consequences of a breach, security professionals must be able to effectively communicate critical data risk in a language business leaders can understand.

The post Failure to Communicate Critical Data Risk to Business Leaders Can Have Perilous Consequences appeared first on Security Intelligence.

Continue reading Failure to Communicate Critical Data Risk to Business Leaders Can Have Perilous Consequences

Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer

To become an influencer within his or her organization, the security leader must effectively communicate with lines of business, engage with the board — and avoid abusing his or her veto power.

The post Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer appeared first on Security Intelligence.

Continue reading Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer

Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

A data breach simulation is a great way to test your team’s crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.

The post Practicing Your Crisis Response: How Well Can You Handle Right of Boom? appeared first on Security Intelligence.

Continue reading Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

SEC Releases Updated Guidance For Cybersecurity Disclosure

The SEC released updated guidance regarding cybersecurity disclosure for public companies, emphasizing the responsibility of executives to report material risks and incidents.

The post SEC Releases Updated Guidance For Cybersecurity Disclosure appeared first on Security Intelligence.

Continue reading SEC Releases Updated Guidance For Cybersecurity Disclosure

SEC Releases Updated Guidance For Cybersecurity Disclosure

The SEC released updated guidance regarding cybersecurity disclosure for public companies, emphasizing the responsibility of executives to report material risks and incidents.

The post SEC Releases Updated Guidance For Cybersecurity Disclosure appeared first on Security Intelligence.

Continue reading SEC Releases Updated Guidance For Cybersecurity Disclosure

Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert

According to IBM cyber risk expert Tim Roberts, security professionals must do a better job of communicating with top management as the technology landscape evolves and new threats emerge.

The post Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert appeared first on Security Intelligence.

Continue reading Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert

The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader

The role of the security leader is expanding, and CISOs must posses strong communication skills, extensive technical knowledge, analytical minds and the respect of their peers to be successful.

The post The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader appeared first on Security Intelligence.

Continue reading The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader

Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Take a look at some traits from the famous “Star Wars” characters we’ve grown to love and explore how those might be applicable to CISOs today.

The post Is Your CISO a Jedi Warrior, an Admiral or a Diplomat? appeared first on Security Intelligence.

Continue reading Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?