Search results: CISO

The Need for Deterministic Security

4 Ways CISOs Can Strengthen Their Security Resilience

A new article in Dark Reading discusses the "4 Ways CISOs Can Strengthen Their Security Resilience." The article caught my attention because one of the 4 areas was to "Secure Workloads and Kubernetes ...
Hi-5 With A CISO  Mário Fernandes, Banco BPI

Hi-5 With A CISO Mário Fernandes, Banco BPI

CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Mário João Fernandes, born and raised in Mozambique, has been working in the banking sector for 29 ...
Hi-5 With A CISO  Mário Fernandes, Banco BPI

Hi-5 With A CISO Mário Fernandes, Banco BPI

CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Mário João Fernandes, born and raised in Mozambique, has been working in the banking sector for 29 ...
CISO Blog Image

CISO Roundtable Recap: Rethinking Security and Governance in the Public Cloud

| | CISO, Uncategorized
A few days ago, I had the privilege of attending a boardroom discussion of CISOs at the virtual Chicago CISO […] The post CISO Roundtable Recap: Rethinking Security and Governance in the ...

2021 Cybersecurity: Mitigating Mobile Security Risks for CISOs

Cybersecurity has always been a significant challenge for businesses, mostly due to the increasing financial and reputational cost of data breaches. As a result, there has been a consistent rise in tactics ...
A CISO’s guide to sensitive data protection

A CISO’s guide to sensitive data protection

As companies become more digitized, they must take appropriate steps in their application security processes to ensure data protection. The post A CISO’s guide to sensitive data protection appeared first on Software ...
CISO Stories Podcast: Five Critical Elements for Protecting the Right Assets

CISO Stories Podcast: Five Critical Elements for Protecting the Right Assets

We have limited investment dollars and therefore must ensure we are protecting the right assets. The practical side of determining “what” needs to be protected and “how” is a convoluted maze of ...
Cyber

Hi-5 With A CISO Dmitriy Sokolovskiy, Avid Technology

CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Dmitriy Sokolovskiy has been working in the cybersecurity space for over 14 years in dedicated security roles, ...
Cyber

Hi-5 With A CISO Dmitriy Sokolovskiy, Avid Technology

CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Dmitriy Sokolovskiy has been working in the cybersecurity space for over 14 years in dedicated security roles, ...

Google’s Office of the CISO Points the Way Towards Scaling Security

Amazon’s, Google’s and Microsoft’s experiences with building massive infrastructures for the world allows for some fascinating insights into the future of IT security at scale. As a result, when Google published The ...