Crisis Leadership, Part 2: What Are We Learning?

In addition to responding to threats in progress, crisis leadership involves rehearsing various responses to prepare for a data breach.

The post Crisis Leadership, Part 2: What Are We Learning? appeared first on Security Intelligence.

Continue reading Crisis Leadership, Part 2: What Are We Learning?

Is the CISO Reporting Structure Outdated?

Many organizations are changing the CISO reporting structure to reflect growing influence of IT over other departments and domains.

The post Is the CISO Reporting Structure Outdated? appeared first on Security Intelligence.

Continue reading Is the CISO Reporting Structure Outdated?

Five Ways to Be a More Effective CISO in 2017

Shifts in the cybersecurity and business landscapes will introduce many additional changes to the ever-evolving role of the CISO in 2017.

The post Five Ways to Be a More Effective CISO in 2017 appeared first on Security Intelligence.

Continue reading Five Ways to Be a More Effective CISO in 2017

Charisma Killed the Cat: Fostering an Effective Cybersecurity Leadership Style

Too much charisma can make for ineffective cybersecurity leadership. CISOs should encourage IT employees to challenge their policies and decision-making.

The post Charisma Killed the Cat: Fostering an Effective Cybersecurity Leadership Style appeared first on Security Intelligence.

Continue reading Charisma Killed the Cat: Fostering an Effective Cybersecurity Leadership Style

Move the CSO to a Different Place on the Security Org Chart

Organizations can improve their ability to enforce security policies and better serve business initiatives by shuffling the security org chart.

The post Move the CSO to a Different Place on the Security Org Chart appeared first on Security Intelligence.

Continue reading Move the CSO to a Different Place on the Security Org Chart

A User’s Guide to Cybersecurity Leadership

Despite the rapid expansion of third-party risks, a recent survey revealed that many companies lack the cybersecurity leadership to respond effectively.

The post A User’s Guide to Cybersecurity Leadership appeared first on Security Intelligence.

Continue reading A User’s Guide to Cybersecurity Leadership

Crisis Leadership: The Missing Link in Cyberattack Defense

C-suite executives often lack the experience and training required to establish and lead a successful cyberattack defense program.

The post Crisis Leadership: The Missing Link in Cyberattack Defense appeared first on Security Intelligence.

Continue reading Crisis Leadership: The Missing Link in Cyberattack Defense

Questions Every CIO Should Ask the Cybersecurity Leader: Part 3

The cybersecurity leader and CIO must collaboratively address 10 common risk management controls to protect the organization’s most sensitive data.

The post Questions Every CIO Should Ask the Cybersecurity Leader: Part 3 appeared first on Security Intelligence.

Continue reading Questions Every CIO Should Ask the Cybersecurity Leader: Part 3

10 Cybersecurity Lessons From 10 Years’ Experience at IBM

IBM Security Director of strategy and product design Kevin Skapinetz shared 10 cybersecurity lessons he picked up in his decade of experience in IT.

The post 10 Cybersecurity Lessons From 10 Years’ Experience at IBM appeared first on Security Intelligence.

Continue reading 10 Cybersecurity Lessons From 10 Years’ Experience at IBM