Five Ways to Improve the CISO-Board Relationship

As cyberthreats grow in numbers and complexity, the future of cybersecurity increasingly depends on an open, trusting CISO-board relationship.

The post Five Ways to Improve the CISO-Board Relationship appeared first on Security Intelligence.

Continue reading Five Ways to Improve the CISO-Board Relationship

NACD Publishes Five Cybersecurity Principles Every Board Director Needs to Know

NACD updated its “Director’s Handbook on Cyber-Risk Oversight,” which included five new cybersecurity principles for boards of directors.

The post NACD Publishes Five Cybersecurity Principles Every Board Director Needs to Know appeared first on Security Intelligence.

Continue reading NACD Publishes Five Cybersecurity Principles Every Board Director Needs to Know

NACD Publishes Five Cybersecurity Principles Every Board Director Needs to Know

NACD updated its “Director’s Handbook on Cyber-Risk Oversight,” which included five new cybersecurity principles for boards of directors.

The post NACD Publishes Five Cybersecurity Principles Every Board Director Needs to Know appeared first on Security Intelligence.

Continue reading NACD Publishes Five Cybersecurity Principles Every Board Director Needs to Know

Looking at the Bigger Picture for Your Information Security Program

IT managers must understand how initiatives related to the information security program affect the business side of the organization.

The post Looking at the Bigger Picture for Your Information Security Program appeared first on Security Intelligence.

Continue reading Looking at the Bigger Picture for Your Information Security Program

Is the CISO Reporting Structure Outdated?

Many organizations are changing the CISO reporting structure to reflect growing influence of IT over other departments and domains.

The post Is the CISO Reporting Structure Outdated? appeared first on Security Intelligence.

Continue reading Is the CISO Reporting Structure Outdated?

Five Ways to Be a More Effective CISO in 2017

Shifts in the cybersecurity and business landscapes will introduce many additional changes to the ever-evolving role of the CISO in 2017.

The post Five Ways to Be a More Effective CISO in 2017 appeared first on Security Intelligence.

Continue reading Five Ways to Be a More Effective CISO in 2017

Charisma Killed the Cat: Fostering an Effective Cybersecurity Leadership Style

Too much charisma can make for ineffective cybersecurity leadership. CISOs should encourage IT employees to challenge their policies and decision-making.

The post Charisma Killed the Cat: Fostering an Effective Cybersecurity Leadership Style appeared first on Security Intelligence.

Continue reading Charisma Killed the Cat: Fostering an Effective Cybersecurity Leadership Style

Industrial drone platform Kespry brings in new CEO

Kespry drone Commercial drone maker, Kespry, which launched in 2013, announced it was bringing in industry vet, George Mathew as CEO today.
Mathew, who most recently was president and COO at data analytics startup Alteryx, has also had stints as GM of business intelligence at SAP and Director of Technical Account Management at Salesforce. It’s fair to say that Kespry was interested in his data… Read More Continue reading Industrial drone platform Kespry brings in new CEO

Move the CSO to a Different Place on the Security Org Chart

Organizations can improve their ability to enforce security policies and better serve business initiatives by shuffling the security org chart.

The post Move the CSO to a Different Place on the Security Org Chart appeared first on Security Intelligence.

Continue reading Move the CSO to a Different Place on the Security Org Chart

The Importance of Building an Information Security Strategic Plan: Part 2

The CISO should be the central figure responsible for defining an organization’s information security strategic plan and aligning it with business goals.

The post The Importance of Building an Information Security Strategic Plan: Part 2 appeared first on Security Intelligence.

Continue reading The Importance of Building an Information Security Strategic Plan: Part 2