5 Characteristics of an Effective Incident Response Team: Lessons From the Front Line

How you respond to a data breach matters. What qualities do the most elite incident response teams possess? The IBM X-Force IRIS team shares its lessons from the front line.

The post 5 Characteristics of an Effective Incident Response Team: Lessons From the Front Line appeared first on Security Intelligence.

Continue reading 5 Characteristics of an Effective Incident Response Team: Lessons From the Front Line

Creating Meaningful Diversity of Thought in the Cybersecurity Workforce

Let’s add the diversity of approach, diversity of values and advocacy for deep customer empathy to the cybersecurity workforce diversity we are building.

The post Creating Meaningful Diversity of Thought in the Cybersecurity Workforce appeared first on Security Intelligence.

Continue reading Creating Meaningful Diversity of Thought in the Cybersecurity Workforce

Celebrating International Women’s Day: Why We Need Better Representation of Women in Security

This International Women’s Day, we celebrate the accomplishments of some of the most influential women in security and explore ways to expose more girls and young women to cyber careers.

The post Celebrating International Women’s Day: Why We Need Better Representation of Women in Security appeared first on Security Intelligence.

Continue reading Celebrating International Women’s Day: Why We Need Better Representation of Women in Security

Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices

Spring is just around the corner, which means it’s time for CISOs to evaluate their security strategy, eliminate processes that aren’t working, and adopt new cybersecurity practices and technologies.

The post Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices appeared first on Security Intelligence.

Continue reading Spring Cleaning for CISOs: Replace These 3 Bad Habits With Better Cybersecurity Practices

Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics

By following the example of industry leaders with mature security analytics capabilities, less advanced organizations can improve SOC visibility and shift from reactive to proactive threat detection.

The post Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics appeared first on Security Intelligence.

Continue reading Follow the Leaders: 7 Tried-and-True Tips to Get the Most Out of Your Security Analytics

RSA Conference 2019 Guide: Insider Tips From an RSAC 2018 Survivor

Discover tips on how to survive RSA Conference 2019, based on first-hand knowledge from an RSAC 2018 survivor and can’t-miss sessions from this year’s show.

The post RSA Conference 2019 Guide: Insider Tips From an RSAC 2018 Survivor appeared first on Security Intelligence.

Continue reading RSA Conference 2019 Guide: Insider Tips From an RSAC 2018 Survivor

Design Your IAM Program With Your Users in Mind

To gain the buy-in you need to make your IAM program successful, it’s important to consider your employees’ goals and needs during the design process.

The post Design Your IAM Program With Your Users in Mind appeared first on Security Intelligence.

Continue reading Design Your IAM Program With Your Users in Mind

Drive Innovation With Your Security Strategy in 2019

As we enter the second month of 2019, organizations should make sure their security strategy accounts for emerging trends, such as the erosion of customer trust and the cybersecurity skills gap.

The post Drive Innovation With Your Security Strategy in 2019 appeared first on Security Intelligence.

Continue reading Drive Innovation With Your Security Strategy in 2019

How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career

Shaked Vax dismantles bombs and created light shows for rock stars before starting his cybersecurity career. Now he’s leading IBM Trusteer’s move into frictionless identity management.

The post How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career appeared first on Security Intelligence.

Continue reading How Former Bomb Disposal Expert and Lighting Designer Shaked Vax Pivoted Toward a Cybersecurity Career

10 Cybersecurity Conference Trips You Should Make Time for This Year

Not sure where to distribute IT budgets for ideal returns? Here’s a roundup of the top 10 cybersecurity conference trips to make time for this year.

The post 10 Cybersecurity Conference Trips You Should Make Time for This Year appeared first on Security Intelligence.

Continue reading 10 Cybersecurity Conference Trips You Should Make Time for This Year