Risk Management July 9, 2018 How to Get Directors On Board With Cyber Risk Governance 3 min read - The latest report from the DCRO urged top leadership to become more engaged in cyber risk governance and to hold all departments — not just IT — accountable for proper security hygiene.
CISO June 29, 2018 Hiring IT Professionals? Here’s Why Your Recruitment Process Is All Wrong 4 min read - As companies grow, the process of hiring IT professionals becomes increasingly tedious, putting them at risk of missing out on top talent.
June 29, 2018 Why Growing Cyberthreat Awareness Among CEOs Could Lead to Bigger Security Budgets 2 min read - Although IT leaders have traditionally struggled to gain executive buy-in for greater security budgets, recent data revealed that cyberthreat concerns are creeping closer to the top of CEOs' agendas.
CISO June 18, 2018 These Four Communication Tips Could Improve Your Cybersecurity Reporting 4 min read - When it comes to cybersecurity reporting, CISOs must communicate security risks, priorities and initiatives in the language of business to earn the attention and respect of board directors.
Artificial Intelligence May 2, 2018 April’s Cybersecurity Recap: More AI, More IoT and a Push for More Privacy 3 min read - April's cybersecurity recap features more enterprises embracing AI and new insights into consumer perspectives on security.
CISO April 19, 2018 As Cyber Risk Escalates, the C-Suite Must Take Action 4 min read - As long as C-suite executives believe that cybersecurity is an IT issue, they will remain disengaged from the solutions and their role in supporting a robust cyber risk management strategy.
Fraud Protection April 12, 2018 Social Engineering: A Trick as Old as Time 4 min read - Social engineering dates back to ancient times. Today, the most common forms of social trickery include baiting, vishing, phishing and other schemes designed to exploit human nature.
CISO March 28, 2018 Putting the ‘I’ in CISO: Why the Security Leader Must Become an Influencer 4 min read - To become an influencer within his or her organization, the security leader must effectively communicate with lines of business, engage with the board — and avoid abusing his or her veto power.
Incident Response March 13, 2018 Practicing Your Crisis Response: How Well Can You Handle Right of Boom? 4 min read - A data breach simulation is a great way to test your team's crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.
March 6, 2018 The Momentum Mandate: Is Cybersecurity Strategy Standing Still? 2 min read - According to recent research, many companies fail to adapt their cybersecurity strategy to the shifting cybercrime landscape, even in the wake of a major data breach.