A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value

Despite ever-growing investments in security tools, the risk of a data breach remains unacceptably high. This is the starting point of a strong a business case for investing in threat intelligence.

The post A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value appeared first on Security Intelligence.

Continue reading A Threat Intelligence Strategy Map: Connecting Technical Activities to Business Value

Does Your Security Awareness Program Put People First?

If people are the most important element of cybersecurity, why do many security awareness training programs fail to deliver the expected results?

The post Does Your Security Awareness Program Put People First? appeared first on Security Intelligence.

Continue reading Does Your Security Awareness Program Put People First?

How to Optimize Security Awareness Training for Different Groups

The more relevant you can make security awareness training to your audience, the more likely you are to have higher engagement rates. But how can you optimize security training for different groups?

The post How to Optimize Security Awareness Training for Different Groups appeared first on Security Intelligence.

Continue reading How to Optimize Security Awareness Training for Different Groups

5 Cyber Skills That Are Essential for the Security Industry’s Next Decade

The human aspect of security tools has not received nearly as much attention as the technological aspects. To get to a more secure future, we need more people with these five cyber skills.

The post 5 Cyber Skills That Are Essential for the Security Industry’s Next Decade appeared first on Security Intelligence.

Continue reading 5 Cyber Skills That Are Essential for the Security Industry’s Next Decade

How to Improve Your Board’s Oversight of Digital Transformation Efforts

A recent National Association of Corporate Directors and Marsh & McLennan Companies report offered recommendations that CISOs can use to help their organizations manage digital transformation.

The post How to Improve Your Board’s Oversight of Digital Transformation Efforts appeared first on Security Intelligence.

Continue reading How to Improve Your Board’s Oversight of Digital Transformation Efforts

How Security Can Lead in Cloud-Dependent Business Innovation

Organizations that have a security-first mindset are better prepared and better able to respond to security threats In the mid-to-late 1970s, the PC represented a major shift in the technological balance of power. It allowed small businesses to analyz… Continue reading How Security Can Lead in Cloud-Dependent Business Innovation

The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters

Reading Time: 5 minutes The array of characters in the Star Trek world mimics the multifaceted role of today’s chief information security officer (CISO).

The post The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters appeared first on Security Intelligence.

Continue reading The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters

The Many Dimensions of Effective CISO Leaders

Reading Time: 5 minutes Does your CISO have the leadership and business qualities necessary to drive effective management of cyber risks? Let’s explore four dimensions that CISOs must learn to master.

The post The Many Dimensions of Effective CISO Leaders appeared first on Security Intelligence.

Continue reading The Many Dimensions of Effective CISO Leaders

5 IoT Security Conferences You Don’t Want to Miss

If you’re a CISO, you should consider attending an IoT security conference to learn from the leaders in the field about how to integrate IoT security into your threat management program.

The post 5 IoT Security Conferences You Don’t Want to Miss appeared first on Security Intelligence.

Continue reading 5 IoT Security Conferences You Don’t Want to Miss

Rewrite the Rules to Reduce Complexity in Your Security Architecture

At RSAC 2019, Sridhar Muppidi and Devin Somppi implored vendors to “start looking at security as a team sport” and redouble their efforts to reduce complexity in their security architecture.

The post Rewrite the Rules to Reduce Complexity in Your Security Architecture appeared first on Security Intelligence.

Continue reading Rewrite the Rules to Reduce Complexity in Your Security Architecture