Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks

Security leaders must translate their technical expertise into business insights when communicating cyber risks to executives and board directors.

The post Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks appeared first on Security Intelligence.

Continue reading Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks

Five Ways Enterprises Can Close the Cybersecurity Skills Gap

To reduce the effects of the cybersecurity skills gap, organizations should ditch traditional recruiting methods and think outside the box.

The post Five Ways Enterprises Can Close the Cybersecurity Skills Gap appeared first on Security Intelligence.

Continue reading Five Ways Enterprises Can Close the Cybersecurity Skills Gap

Changing How We Educate and Hire With a New Collar Approach

Who said you need a degree to work in IT? A new collar approach to recruiting can help organizations close the cybersecurity skills gap.

The post Changing How We Educate and Hire With a New Collar Approach appeared first on Security Intelligence.

Continue reading Changing How We Educate and Hire With a New Collar Approach

Creating a Culture of Security Through Change Management

Effective change management requires thorough planning, constant communication, and strong leadership capable of swaying the organizational culture.

The post Creating a Culture of Security Through Change Management appeared first on Security Intelligence.

Continue reading Creating a Culture of Security Through Change Management

Information Security in the Age of Disinformation

With so much disinformation being reported in the news and spread through social media, it’s hard for security professionals to know what to believe.

The post Information Security in the Age of Disinformation appeared first on Security Intelligence.

Continue reading Information Security in the Age of Disinformation

When a Cyber Crisis Hits, Know Your OODA Loops

OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.

The post When a Cyber Crisis Hits, Know Your OODA Loops appeared first on Security Intelligence.

Continue reading When a Cyber Crisis Hits, Know Your OODA Loops

Security Awareness: Three Lessons From Health Campaigns

Health care initiatives such as the campaign to encourage proper hand-washing can serve as blueprints for CISOs seeking to drive security awareness.

The post Security Awareness: Three Lessons From Health Campaigns appeared first on Security Intelligence.

Continue reading Security Awareness: Three Lessons From Health Campaigns

Don’t Sit Back and Wait for Security Risks to Disappear

Many IT leaders and executives simply accept security risks as a result of poor decisions based on fear, misinformation and flawed insights.

The post Don’t Sit Back and Wait for Security Risks to Disappear appeared first on Security Intelligence.

Continue reading Don’t Sit Back and Wait for Security Risks to Disappear

Traditional Approaches to User Security Training Are Creating Unnecessary Risks

To make user security training more effective, IT leaders must engage employees with a more creative — and less boring — approach.

The post Traditional Approaches to User Security Training Are Creating Unnecessary Risks appeared first on Security Intelligence.

Continue reading Traditional Approaches to User Security Training Are Creating Unnecessary Risks