The State of the Cybersecurity Market: Where We’ve Come, Where We’re Going

There’s an interesting trend that I have personally noticed over the past few years: organizations are starting to take cybersecurity more seriously. With the multitude of high-profile data breaches, organizations are starting ...

The rise of cyber security product sprawl

Twenty years ago, when enterprise information security was starting to hit its stride, nearly all enterprise security software products were bought as point solutions. They did one job – resist malware, scan ...

The Top 8 Concerns for CISO’s in 2020

Although a relatively new corporate position, Chief Information Security Officers (CISOs) are becoming an integral part of the corporate hierarchy as enterprises begin to take security concerns more seriously. It's a smart ...

Is the US Ready for Centralized Data Privacy Enforcement?

The recent news about a proposed bill to create a central data privacy enforcing body shines another spotlight on the high-risk, high stakes shifting ground that many businesses operate their engines of ...
security budget

5 Tools to Make the Case for Security Budget

Of all the headaches CISOs deal with daily (and we know there are many!), making a hard-fought case for an appropriate security budget is one they often have to contend with annually ...
Security Boulevard

Three DevSecOps Lessons Drawn from Conversations with 45 CISOs

Recently, I moderated round table discussions between dozens of CISOs at Evanta CISO Summits in Chicago and Atlanta. My colleague, Michelle Dufty, moderated a similar event in San Francisco ...
Ransomware Protection Checklist

Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring

The post Third CISO Roundtable Overview – Building a Defendable Enterprise with Continuous Monitoring appeared first on CCSI ...

Plights of the Round Table – Strategic Lessons from the Casino

In Part 1 of the Plights of the Round Table, the executive staff of Camelot was working on the strategic plan for the following year. Morgan, the CEO, needs to decide how ...

Deploying the right threat intelligence at the right level

| | Blog, CISO, SOC, Threat Intelligence
Threat intelligence has an influential role to play in organizations, but – like any technology-related solution – it must be applied in the right way to meet its full potential. This blog ...
CISOs report to

Who Should the CISO Report To in 2020?

The debate over who the CISO should report to is a hot topic among security professionals, and that shows no sign of changing soon. That’s because there is still no standard or ...
Security Boulevard