Top 11 Cybersecurity Questions Every CISO Should Be Ready to Answer

Chief Information Security Officers (CISOs) should always anticipate questions that might arise during presentations to senior leaders and corporate boards. Below, we present some typical questions that CISOs should be prepared to answer. We hope these questions help you prepare for the next important presentation you are asked to give ... Read More
gamification, gamified, training, Fortinet Mimecast training

Five Questions To Ask Your CISO About Training

Cybersecurity has emerged as an important component of the conversations that occur at the senior executive and board levels. Furthermore, it is no longer uncommon for boards and leadership teams to include at least one member who has some experience in this critically important area. Such emphasis tracks the disturbing ... Read More
Security Boulevard
Survey Highlights Insider Cyber Risk Focus Among CISOs

Survey Highlights Insider Cyber Risk Focus Among CISOs

| | Industry Insights
Minneapolis, MN: In June 2021, TAG Cyber, a New York-based research and advisory firm that helps enterprise teams rationalize and optimize their security vendor portfolio, partnered with Code42, a Minneapolis-based cyber security company focused on Insider Risk Management, to host an event. Many great insights, lessons, and conversations came out ... Read More
Survey Highlights Insider Cyber Risk Focus Among CISOs

Survey Highlights Insider Cyber Risk Focus Among CISOs

| | Industry Insights
Minneapolis, MN: In June 2021, TAG Cyber, a New York-based research and advisory firm that helps enterprise teams rationalize and optimize their security vendor portfolio, partnered with Code42, a Minneapolis-based cyber security company focused on Insider Risk Management, to host an event. Many great insights, lessons, and conversations came out ... Read More

Measuring Security Continuum Shift: Where Are You On Endpoints?

|
Cyber security pros often conceptualize a linear continuum of protection strategy: The left portion of the line represents security measures that tend to be more preventive of cyber threats, and the right portion represents more reactive approaches. In the early days of cyber security, it was believed that any shift ... Read More