How to Build a Corporate Culture of Cyber Awareness

The key to creating a culture of cyber awareness is to start small, set achievable goals and help employees understand how enterprise security affects their own privacy.

The post How to Build a Corporate Culture of Cyber Awareness appeared first on Security Intelligence.

Continue reading How to Build a Corporate Culture of Cyber Awareness

Asking the Right Questions: Key Takeaways From the CAQ’s ‘Cybersecurity Risk Management Oversight’ Guidance

The Center for Audit Quality (CAQ)’s “Cybersecurity Risk Management Oversight” guidance outlines key questions that board directors should ask about how the organization addresses risk.

The post Asking the Right Questions: Key Takeaways From the CAQ’s ‘Cybersecurity Risk Management Oversight’ Guidance appeared first on Security Intelligence.

Continue reading Asking the Right Questions: Key Takeaways From the CAQ’s ‘Cybersecurity Risk Management Oversight’ Guidance

Women in Security: Perspectives on Inclusion, Issues and Progress From the RSA Conference 2018

At the RSA Conference 2018, industry leaders gathered to discuss issues surrounding women in security, including the key role of female IT professionals in closing the cybersecurity skills gap.

The post Women in Security: Perspectives on Inclusion, Issues and Progress From the RSA Conference 2018 appeared first on Security Intelligence.

Continue reading Women in Security: Perspectives on Inclusion, Issues and Progress From the RSA Conference 2018

As Cyber Risk Escalates, the C-Suite Must Take Action

As long as C-suite executives believe that cybersecurity is an IT issue, they will remain disengaged from the solutions and their role in supporting a robust cyber risk management strategy.

The post As Cyber Risk Escalates, the C-Suite Must Take Action appeared first on Security Intelligence.

Continue reading As Cyber Risk Escalates, the C-Suite Must Take Action

How Effective Is Security Awareness Training for Threat Prevention?

Employees represent the first line of defense against cyberthreats, and effective security awareness training is more crucial than ever given the volatility and sophistication of the threat landscape.

The post How Effective Is Security Awareness Training for Threat Prevention? appeared first on Security Intelligence.

Continue reading How Effective Is Security Awareness Training for Threat Prevention?

In Plain Sight: Why Military Veterans Are a Great Fit for Cybersecurity Careers

To help close the skills gap, IBM supported the launch of TechVets, a nonprofit organization dedicated to helping veterans and service leavers transition into cybersecurity careers.

The post In Plain Sight: Why Military Veterans Are a Great Fit for Cybersecurity Careers appeared first on Security Intelligence.

Continue reading In Plain Sight: Why Military Veterans Are a Great Fit for Cybersecurity Careers

Five Surprising Reasons to Invest in Better Security Training

Security training programs should go beyond the basics and address why phishing attacks, social engineering schemes and other insider threats impact employees personally.

The post Five Surprising Reasons to Invest in Better Security Training appeared first on Security Intelligence.

Continue reading Five Surprising Reasons to Invest in Better Security Training

Failure to Communicate Critical Data Risk to Business Leaders Can Have Perilous Consequences

To avoid the disastrous consequences of a breach, security professionals must be able to effectively communicate critical data risk in a language business leaders can understand.

The post Failure to Communicate Critical Data Risk to Business Leaders Can Have Perilous Consequences appeared first on Security Intelligence.

Continue reading Failure to Communicate Critical Data Risk to Business Leaders Can Have Perilous Consequences

Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer

To become an influencer within his or her organization, the security leader must effectively communicate with lines of business, engage with the board — and avoid abusing his or her veto power.

The post Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer appeared first on Security Intelligence.

Continue reading Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer

The Real Reasons Behind Your Web Security Woes

Many organizations still struggle with application and web security due to numerous persistent challenges, most of which relate to lack of oversight, poor planning and human error.

The post The Real Reasons Behind Your Web Security Woes appeared first on Security Intelligence.

Continue reading The Real Reasons Behind Your Web Security Woes