CISO Suite

CISO Suite

CISOs should report directly to the CEO, study shows

/
Keeping senior leadership abreast of security strengths and vulnerabilities has become a top priority, according to financial sector Chief Information Security Officers (CISOs). And direct communication with the CEO has become imperative, ...
HHS Deputy CIO Amélie Koran on Security's Challenges, Part 1

HHS Deputy CIO Amélie Koran on Security’s Challenges, Part 1

/
Meet Amélie Koran, deputy CIO for the U.S. Department of Health and Human Services, Office of the Inspector General, and one of the keynote speakers at the upcoming InfoSec World 2018 March 19-21 ...
2018-02-10_ITT.png

Weekly Cyber Risk Roundup: Cryptocurrency Attacks and a Major Cybercriminal Indictment

/
Cryptocurrency continued to make headlines this past week for a variety of cybercrime-related activities. For starters, researchers discovered a new cryptocurrency miner, dubbed ADB.Miner, that infected nearly 7,000 Android devices such as ...
5 Steps to Conducting an Enterprise Security Risk Analysis

5 Steps to Conducting an Enterprise Security Risk Analysis

In the world of cybersecurity, identifying risks and how they will impact the organization is of paramount importance. In general terms, risk is comprised of two specific components: The statistical... Go on ...
How to Break Into the Field of Security Risk Management

How to Break Into the Field of Security Risk Management

/
A career in risk management takes place along the front lines of the ongoing cyber war. You must be logical, analytical and level-headed in order to lead the way and keep your ...

Why CISOs should understand the threat landscape to bolster security in 2018

/
Doctors can’t prescribe proper treatment for patients without identifying and analyzing symptoms to make a clinical diagnosis. It’s the same for CISOs, who are responsible for their organization’s digital health ...
Hidden Costs of Cybersecurity Detection Really Add Up

Research Uncovers the Hidden Costs of Detection-based Cybersecurity [Infographic]

/
Our new research conducted by Vanson Bourne finds detect-to-protect security costs organizations more than $16 million per year. This is despite the fact that detection-based cybersecurity is failing to keep up with ...

The RSA Archer Business Risk Management Reference Architecture

/
The RSA® Archer® Business Risk Management Reference Architecture is a high-level visual representation of the framework needed within an organization to understand and manage risk and compliance obligations across the enterprise ...
Dr. Chuvakin's Prescription: 'On Negative Pressure ...'

Dr. Chuvakin’s Prescription: ‘On Negative Pressure …’

/
via Anton Chuvakin, Ph.D., Research VP and Distinguished Analyst at Gartner, speaks security truth to power. Pay attention folks - your organization's security and continued existence could very well depend on the ...
Getting the Most out of a Security Product POC

Getting the Most out of a Security Product POC

/
Vendors, especially in the over crowded security space, often must help buyers justify their investment. But what happens when there isn’t a real problem during the test period? This can make it ...
Loading...