CISO Perspectives
CISOs Enable Business Growth With This Strategy
Can you blame the CISO who wants to quash any tool, system, or process that invites risk into the organization? CISOs face embarrassing data breaches and unceremonious terminations when employees connect unauthorized ...
Why a Telephone Might Be the Best Tool to Stem Third Party Cyber Risk
Compliance checklists and attestations only go so far in mitigating cyber risk. They demonstrate a partner’s commitment to cybersecurity awareness however they only capture a snapshot in time. A vendor, contractor or ...
Successful CISOs Use This Essential Tool Sparingly
If you think looking for a needle in a hay stack would be tough, imagine looking for a needle in a needle stack. Not just any needle, but a very specific needle ...
Want to Be a CISO? Know This First.
From the outside looking in, the CISO career appears pretty glamorous: lots of responsibility, lots of influence, and lots of technology. The reality unfortunately is quite different. Sure, there’s lots of responsibility, ...
For CISOs, a Zero Trust Security Model Won’t Work Until You Do This First
When it comes to safeguarding organizations and the valuable digital assets they produce, hold, and share, a Zero Trust security model is considered par-excellence. But zero trust comes at a cost. If ...
CISOs: Focus On These Fundamentals For Long-Term Success
CISO’s clearly have an appetite for complexity. They secure and monitor an expansive ecosystem filled with sanctioned and unsanctioned systems, solutions, and devices. Most of these technologies generate, store or share sensitive ...
For Healthcare CISOs, There’s No Risk Quite Like This Risk
One one hand, smart devices are a blessing to healthcare, producing valuable data that fuels healthy lifestyles and improves patient care. On the other hand, these devices are a nightmare, overwhelming healthcare ...
Think Your Data Is Hard to Protect? These Assets Are Even Harder.
In terms of sensitive information like PII, PHI, and IP, I’ve frequently said you can’t defend what you can’t see. It’s quite common for organizations to have customer data, financial information, and ...
If Good Help is So Hard to Find, CISOs Find This Next Part Even Harder
Cyber attacks, data breaches and compliance violations are just some of the challenges keeping CISOs up at night. While daunting, these threats are manageable, if you have the budget to address them ...
For CISOs Who Want to Leave a Lasting Legacy, Take This Advice from William Shakespeare
It’s human nature to model the behavior of those we admire. We dress like them, copy their mannerisms, and subscribe to their philosophies. After all, imitation is the sincerest form of flattery ...