Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Take a look at some traits from the famous “Star Wars” characters we’ve grown to love and explore how those might be applicable to CISOs today.

The post Is Your CISO a Jedi Warrior, an Admiral or a Diplomat? appeared first on Security Intelligence.

Continue reading Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens?

By proactively determining who is responsible for data risk management before a data breach occurs, C-suite executives can help avoid such incidents in the first place.

The post Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens? appeared first on Security Intelligence.

Continue reading Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens?

Increasing Security Preparedness and Awareness Among Board Members and Top Management

To increase security preparedness and awareness among executives, CISOs need to communicate cyber risks in business terms and regularly assess their systems for vulnerabilities.

The post Increasing Security Preparedness and Awareness Among Board Members and Top Management appeared first on Security Intelligence.

Continue reading Increasing Security Preparedness and Awareness Among Board Members and Top Management

Four Key Lessons From NACD’s ‘2018 Governance Outlook’ About Managing Cyber Risks

The National Association of Corporate Directors (NACD)’s “2018 Governance Outlook: Projections on Emerging Board Matters” offered key advice to help board directors engage with cyber risk management.

The post Four Key Lessons From NACD’s ‘2018 Governance Outlook’ About Managing Cyber Risks appeared first on Security Intelligence.

Continue reading Four Key Lessons From NACD’s ‘2018 Governance Outlook’ About Managing Cyber Risks

Where the CISO Should Sit on the Security Org Chart and Why It Matters

The CISO’s position on the security org chart influences the nature and frequency of interactions the security leader will have other executives — not to mention the security budget.

The post Where the CISO Should Sit on the Security Org Chart and Why It Matters appeared first on Security Intelligence.

Continue reading Where the CISO Should Sit on the Security Org Chart and Why It Matters

Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018

CISOs can improve their enterprise security posture by adopting cognitive technology, educating executives, conducting incident response training and fostering a culture of security in 2018.

The post Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018 appeared first on Security Intelligence.

Continue reading Five New Year’s Resolutions to Help CISOs Improve Enterprise Security in 2018

Long Road Ahead or Unbridgeable Chasm? Lessons From the EY ‘Global Information Security Survey’

The EY “Global Infomation Security Survey” revealed that CISOs and executives have a long road ahead when it comes to improving communication — but it is indeed a road, not an unbridgeable chasm.

The post Long Road Ahead or Unbridgeable Chasm? Lessons From the EY ‘Global Information Security Survey’ appeared first on Security Intelligence.

Continue reading Long Road Ahead or Unbridgeable Chasm? Lessons From the EY ‘Global Information Security Survey’

Data Risk Management: How to Put Executives in the Driver’s Seat

Executives are increasingly viewing data risk management as an area that can reduce costs and increase information security.

The post Data Risk Management: How to Put Executives in the Driver’s Seat appeared first on Security Intelligence.

Continue reading Data Risk Management: How to Put Executives in the Driver’s Seat

Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges

Organizations that follow both the COSO enterprise risk management framework and the NIST CSF can vastly improve their cyber risk oversight and management.

The post Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges appeared first on Security Intelligence.

Continue reading Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges