Futurecon - Dallas

CISOs Enable Business Growth With This Strategy

Can you blame the CISO who wants to quash any tool, system, or process that invites risk into the organization? CISOs face embarrassing data breaches and unceremonious terminations when employees connect unauthorized ...

Why a Telephone Might Be the Best Tool to Stem Third Party Cyber Risk

Compliance checklists and attestations only go so far in mitigating cyber risk. They demonstrate a partner’s commitment to cybersecurity awareness however they only capture a snapshot in time. A vendor, contractor or ...
Chicago cybersecurity leaders

Successful CISOs Use This Essential Tool Sparingly

If you think looking for a needle in a hay stack would be tough, imagine looking for a needle in a needle stack. Not just any needle, but a very specific needle ...
Alan Levine, CISO for Alcoa (retired)

Want to Be a CISO? Know This First.

From the outside looking in, the CISO career appears pretty glamorous: lots of responsibility, lots of influence, and lots of technology. The reality unfortunately is quite different. Sure, there’s lots of responsibility, ...
Claude Schanet, CISO, GovSat Luxembourg

For CISOs, a Zero Trust Security Model Won’t Work Until You Do This First

When it comes to safeguarding organizations and the valuable digital assets they produce, hold, and share, a Zero Trust security model is considered par-excellence. But zero trust comes at a cost. If ...
Jay Gonzales, CISO, Samsung Semiconductor

CISOs: Focus On These Fundamentals For Long-Term Success

CISO’s clearly have an appetite for complexity. They secure and monitor an expansive ecosystem filled with sanctioned and unsanctioned systems, solutions, and devices. Most of these technologies generate, store or share sensitive ...
Larry Whiteside, Veteran CISO and Cybersecurity Thought Leader

For Healthcare CISOs, There’s No Risk Quite Like This Risk

One one hand, smart devices are a blessing to healthcare, producing valuable data that fuels healthy lifestyles and improves patient care. On the other hand, these devices are a nightmare, overwhelming healthcare ...
Philadelphia Data Connectors Cybersecurity Leaders

Think Your Data Is Hard to Protect? These Assets Are Even Harder.

In terms of sensitive information like PII, PHI, and IP, I’ve frequently said you can’t defend what you can’t see. It’s quite common for organizations to have customer data, financial information, and ...
Aaron Blackstone, CISO for Texas Department of Public Safety

If Good Help is So Hard to Find, CISOs Find This Next Part Even Harder

Cyber attacks, data breaches and compliance violations are just some of the challenges keeping CISOs up at night. While daunting, these threats are manageable, if you have the budget to address them ...
Jake Margolis, CISO, Metro Water District for So. Cal

For CISOs Who Want to Leave a Lasting Legacy, Take This Advice from William Shakespeare

It’s human nature to model the behavior of those we admire. We dress like them, copy their mannerisms, and subscribe to their philosophies. After all, imitation is the sincerest form of flattery ...

Secure Guardrails