Move the CSO to a Different Place on the Security Org Chart

Organizations can improve their ability to enforce security policies and better serve business initiatives by shuffling the security org chart.

The post Move the CSO to a Different Place on the Security Org Chart appeared first on Security Intelligence.

Continue reading Move the CSO to a Different Place on the Security Org Chart

The Importance of Building an Information Security Strategic Plan: Part 2

The CISO should be the central figure responsible for defining an organization’s information security strategic plan and aligning it with business goals.

The post The Importance of Building an Information Security Strategic Plan: Part 2 appeared first on Security Intelligence.

Continue reading The Importance of Building an Information Security Strategic Plan: Part 2

A User’s Guide to Cybersecurity Leadership

Despite the rapid expansion of third-party risks, a recent survey revealed that many companies lack the cybersecurity leadership to respond effectively.

The post A User’s Guide to Cybersecurity Leadership appeared first on Security Intelligence.

Continue reading A User’s Guide to Cybersecurity Leadership

Secure By Design: Antidote for Dynamic Cyberthreats

Secure by design requires IT teams to implement security functions into every phase of an application or platform’s development.

The post Secure By Design: Antidote for Dynamic Cyberthreats appeared first on Security Intelligence.

Continue reading Secure By Design: Antidote for Dynamic Cyberthreats

First Day on the Job for a Typical CIO or CISO

When starting a new job, the CIO must become intimately knowledgeable about the data within his or her jurisdiction and develop strategies ahead of time.

The post First Day on the Job for a Typical CIO or CISO appeared first on Security Intelligence.

Continue reading First Day on the Job for a Typical CIO or CISO

Employ Enterprise Security Collaboration to Blunt Cyber Risks

Enterprise security collaboration is critical to protecting valuable business data. IT managers should consult executives and train them on cyberthreats.

The post Employ Enterprise Security Collaboration to Blunt Cyber Risks appeared first on Security Intelligence.

Continue reading Employ Enterprise Security Collaboration to Blunt Cyber Risks

Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games

Organizations seeking to prevent insider threats should establish red, blue and black teams to produce threat models for multiplayer games.

The post Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games appeared first on Security Intelligence.

Continue reading Insider Threats, Industrial Sabotage and Game Theory, Part 3: Multiplayer Games

Crisis Leadership: The Missing Link in Cyberattack Defense

C-suite executives often lack the experience and training required to establish and lead a successful cyberattack defense program.

The post Crisis Leadership: The Missing Link in Cyberattack Defense appeared first on Security Intelligence.

Continue reading Crisis Leadership: The Missing Link in Cyberattack Defense

Questions Every CIO Should Ask the Cybersecurity Leader: Part 3

The cybersecurity leader and CIO must collaboratively address 10 common risk management controls to protect the organization’s most sensitive data.

The post Questions Every CIO Should Ask the Cybersecurity Leader: Part 3 appeared first on Security Intelligence.

Continue reading Questions Every CIO Should Ask the Cybersecurity Leader: Part 3