Insider Threats, Industrial Sabotage and Game Theory

Insider threats can achieve industrial sabotage by slowly gaining control over individual projects, programs and then eventually the company.

The post Insider Threats, Industrial Sabotage and Game Theory appeared first on Security Intelligence.

Continue reading Insider Threats, Industrial Sabotage and Game Theory

The CISO Job Market in 2016: Time to Jump Ship?

The CISO job market may be red hot, but that doesn’t mean the time is right for you to jump ship and pursue elusive new opportunities.

The post The CISO Job Market in 2016: Time to Jump Ship? appeared first on Security Intelligence.

Continue reading The CISO Job Market in 2016: Time to Jump Ship?

Five Signs the CISO Who Got You Here Isn’t the Best One to Get You There

A CISO who was successful in the past may not necessarily be the right fit to lead an organization into the future. Here’s how to tell.

The post Five Signs the CISO Who Got You Here Isn’t the Best One to Get You There appeared first on Security Intelligence.

Continue reading Five Signs the CISO Who Got You Here Isn’t the Best One to Get You There

How to Make the Most of Your Pen Test

A pen test can be tremendously valuable for your team and organization, but you have to know how to glean the key lessons from the experience.

The post How to Make the Most of Your Pen Test appeared first on Security Intelligence.

Continue reading How to Make the Most of Your Pen Test

What Can’t Go On With Security: How Stein’s Law Impacts Your Information Security Program

Stein’s Law says that if something cannot go on forever, it won’t. That even applies to your enterprise security program and its risk posture.

The post What Can’t Go On With Security: How Stein’s Law Impacts Your Information Security Program appeared first on Security Intelligence.

Continue reading What Can’t Go On With Security: How Stein’s Law Impacts Your Information Security Program

Engaging Conversations Key to Improving Cyber Risk Decisions

C-level executives, boards of directors and security leadership need to have engaging conversations to make better cyber risk decisions for the business.

The post Engaging Conversations Key to Improving Cyber Risk Decisions appeared first on Security Intelligence.

Continue reading Engaging Conversations Key to Improving Cyber Risk Decisions

Securing the C-Suite, Part 3: All Eyes on the CEO

The CEO has an important role to play in cybersecurity. Collaborating with other business leaders and getting involved with cybersecurity is critical.

The post Securing the C-Suite, Part 3: All Eyes on the CEO appeared first on Security Intelligence.

Continue reading Securing the C-Suite, Part 3: All Eyes on the CEO

Securing the C-Suite, Part 2: The Role of CFOs, CMOs and CHROs

The new 2016 “Securing the C-Suite” report from IBM revealed some insights and recommendations on the role of CFOs, CMOs and CHROs in cybersecurity.

The post Securing the C-Suite, Part 2: The Role of CFOs, CMOs and CHROs appeared first on Security Intelligence.

Continue reading Securing the C-Suite, Part 2: The Role of CFOs, CMOs and CHROs

Why IT and Security Staff Need the Time and Budget to Go to Security Conferences

Attending security conferences gives employees experience and connections that can help both themselves and their employers succeed.

The post Why IT and Security Staff Need the Time and Budget to Go to Security Conferences appeared first on Security Intelligence.

Continue reading Why IT and Security Staff Need the Time and Budget to Go to Security Conferences