Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

A data breach simulation is a great way to test your team’s crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.

The post Practicing Your Crisis Response: How Well Can You Handle Right of Boom? appeared first on Security Intelligence.

Continue reading Practicing Your Crisis Response: How Well Can You Handle Right of Boom?

Implementing O&A: Why Intelligence Is the Key to Strategic Orchestration

By implementing orchestration and automation (O&A), security leaders can deliver the real-time threat intelligence their understaffed analyst teams need to punch above their weight.

The post Implementing O&A: Why Intelligence Is the Key to Strategic Orchestration appeared first on Security Intelligence.

Continue reading Implementing O&A: Why Intelligence Is the Key to Strategic Orchestration

Seize the Day: Celebrating Women in Security

International Women’s Day is March 8, and IBM is joining the #PressforProgress by asking six inspiring women in security their thoughts on the industry and the next generation of security workers.

The post Seize the Day: Celebrating Women in Security appeared first on Security Intelligence.

Continue reading Seize the Day: Celebrating Women in Security

Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert

According to IBM cyber risk expert Tim Roberts, security professionals must do a better job of communicating with top management as the technology landscape evolves and new threats emerge.

The post Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert appeared first on Security Intelligence.

Continue reading Building Resilience Against Evolving Technology: An Interview With a Cyber Risk Expert

Listen to Your Cassandras to Avoid Cybersecurity Disasters

Instead of dismissing experts who warn of impending cybersecurity disasters, business leaders should thoroughly investigate the issue at hand and prepare a response to minimize the potential damage.

The post Listen to Your Cassandras to Avoid Cybersecurity Disasters appeared first on Security Intelligence.

Continue reading Listen to Your Cassandras to Avoid Cybersecurity Disasters

The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader

The role of the security leader is expanding, and CISOs must posses strong communication skills, extensive technical knowledge, analytical minds and the respect of their peers to be successful.

The post The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader appeared first on Security Intelligence.

Continue reading The Expanding Role of the CISO: Seven Attributes of a Successful Security Leader

Who Needs a College Degree? Filling the Skills Gap With Qualified New Collar Professionals

A college degree was once thought to guarantee a successful career. For some professions, structured coursework and vetted certification is the only way to ensure that a student was prepared to take on a challenging job. Other industries, however, don’t necessarily equate the lack of a college education to a lack of qualification. These roles […]

The post Who Needs a College Degree? Filling the Skills Gap With Qualified New Collar Professionals appeared first on Security Intelligence.

Continue reading Who Needs a College Degree? Filling the Skills Gap With Qualified New Collar Professionals

Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Take a look at some traits from the famous “Star Wars” characters we’ve grown to love and explore how those might be applicable to CISOs today.

The post Is Your CISO a Jedi Warrior, an Admiral or a Diplomat? appeared first on Security Intelligence.

Continue reading Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Take a look at some traits from the famous “Star Wars” characters we’ve grown to love and explore how those might be applicable to CISOs today.

The post Is Your CISO a Jedi Warrior, an Admiral or a Diplomat? appeared first on Security Intelligence.

Continue reading Is Your CISO a Jedi Warrior, an Admiral or a Diplomat?

Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens?

By proactively determining who is responsible for data risk management before a data breach occurs, C-suite executives can help avoid such incidents in the first place.

The post Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens? appeared first on Security Intelligence.

Continue reading Data Risk Management, Part 2: Who Is Ultimately Accountable When a Big Breach Happens?