10 Do’s and Don’ts for Writing a Winning Cybersecurity Resume

You can land a job in cybersecurity even if you didn’t study it. Here are 10 do’s and don’ts for writing a winning cybersecurity resume, even if you’re not a traditionally qualified candidate.

The post 10 Do’s and Don’ts for Writing a Winning Cybersecurity Resume appeared first on Security Intelligence.

Continue reading 10 Do’s and Don’ts for Writing a Winning Cybersecurity Resume

Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program

Reading Time: 4 minutes When implemented correctly, zero trust can improve a company’s resilience to recover after a breach. But when you don’t trust users to make good decisions and act accordingly, the system falls apart.

The post Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program appeared first on Security Intelligence.

Continue reading Your Users Aren’t the Weakest Link — They’re Integral to Your Security Program

The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters

Reading Time: 5 minutes The array of characters in the Star Trek world mimics the multifaceted role of today’s chief information security officer (CISO).

The post The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters appeared first on Security Intelligence.

Continue reading The Many Roles of the CISO as Viewed as ‘Star Trek’ Characters

The Many Dimensions of Effective CISO Leaders

Reading Time: 5 minutes Does your CISO have the leadership and business qualities necessary to drive effective management of cyber risks? Let’s explore four dimensions that CISOs must learn to master.

The post The Many Dimensions of Effective CISO Leaders appeared first on Security Intelligence.

Continue reading The Many Dimensions of Effective CISO Leaders

5 IoT Security Conferences You Don’t Want to Miss

If you’re a CISO, you should consider attending an IoT security conference to learn from the leaders in the field about how to integrate IoT security into your threat management program.

The post 5 IoT Security Conferences You Don’t Want to Miss appeared first on Security Intelligence.

Continue reading 5 IoT Security Conferences You Don’t Want to Miss

Women in Cybersecurity No Longer an ‘Anomaly’

Truth be told, there are many women in cybersecurity who are tired of talking about women in the industry as if they are anomalies. For many female professionals, it’s far past the time for the narrative to change. Rather than be seen as a token… Continue reading Women in Cybersecurity No Longer an ‘Anomaly’

Is Your Company Culture Seamlessly Secure — or Just Stressful?

As security practitioners, we probably have a good grasp of technological controls. But adversarial company culture may be creating stress that keeps people from protecting our data.

The post Is Your Company Culture Seamlessly Secure — or Just Stressful? appeared first on Security Intelligence.

Continue reading Is Your Company Culture Seamlessly Secure — or Just Stressful?

In Light of Ever-Increasing Cybersecurity Risks, Boards Must Deepen Their Oversight and Engagement

In light of a regulatory landscape that is becoming more complex and costly, boards need better insight into the organization’s risk exposure and its ability to handle cybersecurity risks.

The post In Light of Ever-Increasing Cybersecurity Risks, Boards Must Deepen Their Oversight and Engagement appeared first on Security Intelligence.

Continue reading In Light of Ever-Increasing Cybersecurity Risks, Boards Must Deepen Their Oversight and Engagement

Why CISOs Need a Mentor (and What They Can Learn From One)

After more than a decade of researching and writing about security leadership, naturally I have a lot of security executives in my network. One theme I note that is popping up more frequently lately in my news feeds is the need for security profession… Continue reading Why CISOs Need a Mentor (and What They Can Learn From One)