Alan Levine, CISO for Alcoa (retired)

Want to Be a CISO? Know This First.

From the outside looking in, the CISO career appears pretty glamorous: lots of responsibility, lots of influence, and lots of technology. The reality unfortunately is quite different. Sure, there’s lots of responsibility, ...
Unify Access to All Your Enterprise Content Repositories

Protect Your Digital Assets with Unified Access to Enterprise Content Repositories

A highly secure downtown office building has multiple layers of security. Employees must show identification in order to get through the front door and their badges only grant them access to their ...
Claude Schanet, CISO, GovSat Luxembourg

For CISOs, a Zero Trust Security Model Won’t Work Until You Do This First

When it comes to safeguarding organizations and the valuable digital assets they produce, hold, and share, a Zero Trust security model is considered par-excellence. But zero trust comes at a cost. If ...
Jay Gonzales, CISO, Samsung Semiconductor

CISOs: Focus On These Fundamentals For Long-Term Success

CISO’s clearly have an appetite for complexity. They secure and monitor an expansive ecosystem filled with sanctioned and unsanctioned systems, solutions, and devices. Most of these technologies generate, store or share sensitive ...
Larry Whiteside, Veteran CISO and Cybersecurity Thought Leader

For Healthcare CISOs, There’s No Risk Quite Like This Risk

One one hand, smart devices are a blessing to healthcare, producing valuable data that fuels healthy lifestyles and improves patient care. On the other hand, these devices are a nightmare, overwhelming healthcare ...
Secure and Empower Employee Workflows With Enterprise Application Plugins

Secure and Empower Employee Workflows With Enterprise Application Plugins

There’s a fine line between protecting sensitive information from data leaks and making that information easy to share with trusted partners. Make the process too difficult for employees, and they will find ...
Philadelphia Data Connectors Cybersecurity Leaders

Think Your Data Is Hard to Protect? These Assets Are Even Harder.

In terms of sensitive information like PII, PHI, and IP, I’ve frequently said you can’t defend what you can’t see. It’s quite common for organizations to have customer data, financial information, and ...
Control Third Party Communication Apps to Protect Your Third Party Workflows

Control Third Party Communication Apps to Protect Your Third Party Workflows

Much like a busy office building with employees and guests coming and going, it’s impossible to monitor all information leaving and entering your organization. Everyday third party communication apps, such as email, ...
Aaron Blackstone, CISO for Texas Department of Public Safety

If Good Help is So Hard to Find, CISOs Find This Next Part Even Harder

Cyber attacks, data breaches and compliance violations are just some of the challenges keeping CISOs up at night. While daunting, these threats are manageable, if you have the budget to address them ...
Jake Margolis, CISO, Metro Water District for So. Cal

For CISOs Who Want to Leave a Lasting Legacy, Take This Advice from William Shakespeare

It’s human nature to model the behavior of those we admire. We dress like them, copy their mannerisms, and subscribe to their philosophies. After all, imitation is the sincerest form of flattery ...
Loading...