Tag: cio
-
Unstructured Data Management: Closing the Gap Between Risk and Response
Unstructured Data Management: Closing the Gap Between Risk and Response madhav Tue, 06/24/2025 – 05:44 The world is producing data at an exponential rate. With generative AI driving 90% of all newly created content, organizations are overwhelmed by an ever-growing data estate. More than 181 zettabytes of data now exist globally”, and 80% of it…
-
How Exposure Management Helps Communicate Cyber Risk
Tags: access, attack, awareness, best-practice, business, cio, cyber, cybersecurity, data, framework, metric, risk, risk-management, threat, tool, update, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. This week, Tenable experts discuss best practices for communicating cyber risk. You can read the entire Exposure Management Academy series here. Despite headline-grabbing incidents and keen interest from C-suites and boardrooms, many security…
-
Interview: Rolf Krolke, CIO, The Access Group
We talk to The Access Group’s CIO about integration and ongoing management of legacy systems in an extremely acquisitive company, and the worldwide storage refresh he’s overseeing as part of that process First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366626317/Interview-Rolf-Krolke-CIO-The-Access-Group
-
Erster Zero-Click-Angriff auf Microsoft 365 Copilot
Eine Lücke in Microsoft 365 Copilot ermöglicht es, sensible Daten zu stehlen.Stellen Sie sich einen Angriff vor, der so heimlich ist, dass er keine Klicks, keine Downloads und keine Warnungen erfordert es reicht eine einzelne E-Mail, die in Ihrem Posteingang landet. Das ist der Fall bei EchoLeak, einer kritischen Sicherheitslücke in Microsoft 365 Copilot. Sie…
-
2025 CSO Hall of Fame honorees
Tags: ceo, cio, ciso, corporate, cybersecurity, finance, google, group, infrastructure, international, jobs, risk, risk-management, sans, technologyMeg Anderson, VP & CISO (retired), Principal Financial Group Bob Bruns, CISO, Avanade Jonathan Chow, CISO, Genesys Mignona Cote, CISO, Infor Laura Deaner, Managing Director, CISO, The Depository Trust & Clearing Corporation (DTCC) George Finney, CISO, University of Texas System Michael Gordon, SVP & CISO, McDonald’s Ron Green, Cybersecurity Fellow/Former CSO, Mastercard Shawn Henry, CSO, CrowdStrike Todd Lukens, SVP, Security & Infrastructure, Nationwide Rishi Tripathi,…
-
Cybersecurity Snapshot: Experts Issue Best Practices for Migrating to Post-Quantum Cryptography and for Improving Orgs’ Cyber Culture
Tags: access, attack, best-practice, business, cio, ciso, communications, computer, computing, conference, corporate, crypto, cryptography, cyber, cybersecurity, data, defense, email, encryption, finance, government, group, ibm, identity, incident, incident response, infrastructure, jobs, lessons-learned, metric, microsoft, mitre, monitoring, nist, risk, service, strategy, technology, threat, tool, training, update, vulnerability, vulnerability-management, warfareCheck out a new roadmap for adopting quantum-resistant cryptography. Plus, find out how your company can create a better cybersecurity environment. In addition, MITRE warns about protecting critical infrastructure from cyber war. And get the latest on exposure response strategies and on CISO compensation and job satisfaction. Dive into five things that are top of…
-
Cyber Resilience in Zeiten geopolitischer Unsicherheit
Tags: cio, ciso, cloud, compliance, cyber, cyberattack, firewall, governance, infrastructure, monitoring, resilience, risk, risk-analysis, siem, update, vulnerability-managementCyberbedrohungen existieren längst nicht mehr im luftleeren Raum sie entstehen im Spannungsfeld von Geopolitik, regulatorischer Zersplitterung und einer stetig wachsenden digitalen Angriffsfläche.Cybersecurity ist heute ein rechtliches, operatives und geopolitisches Thema. Für CIOs und CISOs ist die Botschaft eindeutig: Resilienz bedeutet nicht mehr nur, zu reagieren, sondern vorbereitet zu sein. Vorbereitung heißt, Systeme und Teams aufzubauen,…
-
Beyond Perimeter Defense: Making Attack Surface Management a Business Enabler
As cyber threats outpace traditional perimeter defenses, organizations face mounting risks in their digital transformation efforts. This article examines how Outpost24’s continuous attack surface management transforms security into a strategic business enabler, equipping CISOs, CIOs, and IT Directors with automated visibility and insights to pursue innovation with confidence and resilience. First seen on techrepublic.com Jump…
-
Schlechtes Preis-Leistungs-Verhältnis – CIOs sind enttäuscht von Security-Systemen
Tags: cioFirst seen on security-insider.de Jump to article: www.security-insider.de/logicalis-studie-cio-ueberfluessige-sicherheitsloesungen-a-c55db49e667ebdc387f2f76071e7b9b1/
-
Even $5M a year can’t keep top CISOs happy
Some are unhappy with budgets too: : Not all CISOs working at large enterprises are happy with their six-figure salaries. According to the survey, only 55% of respondents working for $20 billion-plus firms were satisfied with what they were being paid and that group was the least satisfied of all questioned with what they were…
-
Agenten-KI: Die stille Revolution der Cyber-Sicherheit
Die nächste große Wende in der Informationssicherheit hat längst begonnen: KI verändert Geschäftsmodelle -prozesse grundlegend und stellt die Cyber-Sicherheit vor neue Herausforderungen. Denn wo Maschinen in Millisekunden reagieren, reichen klassische Kontrollmechanismen nicht mehr aus. Für CISOs und CIOs heißt das: Strategien, Prozesse und Kontrollfunktionen müssen neu gedacht werden besonders im Licht der aufkommenden Agenten-KI. First…
-
ICYMI: A Look Back at Exposure Management Academy Highlights
Tags: attack, business, ceo, cio, control, cyber, cybersecurity, data, framework, infrastructure, intelligence, office, risk, risk-management, strategy, technology, threat, tool, update, vulnerability, vulnerability-managementEach Monday, the Tenable Exposure Management Academy provides the practical, real-world guidance you need to shift from vulnerability management to exposure management. This week, we look back on some highlights from the first couple of months of posts, including the broad view exposure management provides, business impact and getting to a single pane of glass.…
-
The 7 unwritten rules of leading through crisis
Tags: automation, best-practice, business, ceo, cio, cyber, cybersecurity, incident response, intelligence, radius, risk, security-incident, service, software, strategy, tactics, technology, threat, tool, trainingRule 2: A proactive mindset sets the stage for collective learning: Confusion is contagious. “Providing clarity about what’s known, what matters, and what you’re aiming for, stabilizes people and systems,” says Leila Rao, a workplace and executive coaching consultant. “It sets the tone for proactivity instead of reactivity.”Simply treating symptoms will make the problem worse,…
-
Heute startet der CIO Charity Run&Bike 2025
Seit Jahren engagiert sich die CIO-Community leidenschaftlich im Rahmen des CIO Charity Run&Bike für gemeinnützige Organisationen. FoundryEs geht los! Vom 23. Mai bis 9. Juni 2025 sporteln Deutschlands IT-Verantwortliche im Rahmen den CIO Charity Run&Bike gemeinsam für den guten Zweck. Über 1.000 IT-Verantwortliche haben sich bereits angemeldet.Kurzentschlossene können sich weiterhin registrieren unter: www.cio-charity.de/Egal ob Laufschuh,…
-
Agentic-AI und die Zukunft der Cybersecurity
Die technologische Entwicklung im Bereich der künstlichen Intelligenz (KI) hat in den letzten Jahren ein beispielloses Tempo erreicht. Diese Dynamik verändert nicht nur Geschäftsmodelle und Prozesse, sondern stellt auch die Cybersicherheit vor völlig neue Herausforderungen. Für CISOs, CIOs und andere Entscheidungsträger bedeutet dies: Strategien, Prozesse und Kontrollmechanismen müssen neu bewertet und konsequent weiterentwickelt werden, insbesondere…
-
Former Unilever CISO Kirsten Davies to Take Pentagon Post
Private-Sector Cyber Leader Kirsten Davies Tapped to Lead DoD IT and Security. President Donald Trump has nominated Kirsten Davies to serve as CIO of the Department of Defense – a pivotal role in modernizing the Pentagon’s sprawling digital infrastructure. The nomination was submitted to Congress and has been referred to the Committee on Armed Services…
-
S. Dakota CIO Gottumukkala Signs on as CISA Deputy Director
The addition is an important hire for the No. 2 position at the cyber agency. The main director role remains unfilled post-Easterly, with Bridget Bean taking over acting duties for now. First seen on darkreading.com Jump to article: www.darkreading.com/threat-intelligence/gottumukkala-cisa-deputy-director
-
Preparing for the post-quantum era: a CIO’s guide to securing the future of encryption
Here’s why CIOs must lead post-quantum cryptography adoption in 2025 to secure digital assets and future-proof organizations. First seen on cyberscoop.com Jump to article: cyberscoop.com/quantum-computing-cio-pqc-preparation-2025/
-
Rubrik-Studie zeigt – Datenwildwuchs führt zu Anstieg von Sicherheitsvorfällen
Die Ergebnisse stammen aus einer weltweiten Umfrage unter über 1.600 IT- und Sicherheitsverantwortlichen in zehn Ländern die Hälfte davon CIOs oder CISOs. Ergänzt wurde die Studie durch Rubrik-Telemetriedaten aus Cloud-, SaaS- und On-Premises-Umgebungen. First seen on infopoint-security.de Jump to article: www.infopoint-security.de/rubrik-studie-zeigt-datenwildwuchs-fuehrt-zu-anstieg-von-sicherheitsvorfaellen/a40818/
-
CIOs grapple with budget pressures: New playbook offers fresh take on network security ROI
First seen on scworld.com Jump to article: www.scworld.com/resource/cios-grapple-with-budget-pressures-new-playbook-offers-fresh-take-on-network-security-roi
-
IAM 2025: Diese 10 Trends entscheiden über Ihre Sicherheitsstrategie
Tags: access, ai, api, authentication, best-practice, cio, ciso, cloud, compliance, conference, credentials, crypto, cryptography, detection, dora, framework, governance, iam, identity, iot, kritis, login, mfa, nis-2, resilience, risk, risk-analysis, service, strategy, threat, tool, zero-trustDie Kernaussage der EIC Conference 2025: IAM ist ein ganzheitlicher Architekturansatz und kein Toolset. Identity & Access Management (IAM) ist nicht länger eine Frage der Tool-Auswahl, sondern der Architektur. Diese Kernaussage prägte die European Identity and Cloud Conference 2025, die vom 6. bis 9. Mai in Berlin stattfand. Mit über 1.500 Teilnehmern, 300 Rednern und…
-
CIO des Jahres 2025 jetzt mitmachen und bis Ende Mai bewerben
So sehen Siegerinnen und Sieger aus. Die Gewinnerinnen und Gewinner des vergangenen Jahres jubeln über ihre CIO-des-Jahres-Awards. Machen auch Sie mit und bewerben Sie sich dann stehen Sie vielleicht im Oktober 2025 auf der großen Gala-Bühne und dürfen sich über die renommierteste IT-Auszeichnung Deutschlands freuen. cio.de / Tobias TschepeDie heiße Phase für die Bewerbung um…
-
The rise of vCISO as a viable cybersecurity career path
Tags: advisory, business, ceo, cio, ciso, compliance, computer, control, country, cyber, cybersecurity, government, grc, group, guide, healthcare, incident response, infrastructure, ISO-27001, jobs, mobile, network, nist, risk, risk-assessment, risk-management, service, skills, strategy, technology, tool, trainingDamon Petraglia, vCISO and CISO on demand Blue Mantis Damon Petraglia A long-time cybersecurity pro with chops built up in the federal government world and through forensic investigation work, Damon Petraglia works as a vCISO and CISO on demand for the IT services firm Blue Mantis.”Where I am today as a vCISO is a culmination…
-
How to rationalize IDPs (without painful migrations)
For enterprise CIOs, CISOs, and IT leaders, managing multiple identity providers (IDPs) is a costly, complex, and security-intensive challenge. Whether due to M&A activities, multi-cloud strategies, or regulatory requirements, fragmented identity ecosystems drive up expenses, increase security risks, and hinder operational efficiency. Why organizations run multiple identity providers Large enterprises often run multiple Identity Providers……
-
More secure federal instant messaging platforms pushed by acting Pentagon CIO
Tags: cioFirst seen on scworld.com Jump to article: www.scworld.com/brief/more-secure-federal-instant-messaging-platforms-pushed-by-acting-pentagon-cio
-
CIOs pay too much for not enough IT security
Cyber system complexity and a lack of adequate tools are adding to enterprise IT headaches, according to Logicalis Group. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cisos-pay-it-security-survey/747668/
-
‘CISOs sprechen heute die Sprache des Business”
Nick Godfrey, Leiter des Office of the CISO bei Google Cloud Google CloudAls Senior Director und Leiter des Office of the CISO bei Google Cloud ist es die Aufgabe von Nick Godfrey, das Unternehmen beim Austausch zwischen CISOs rund um die Themen Cloud und Security zu unterstützen. Godfrey, selbst ehemaliger Sicherheitsverantwortlicher bei einem Finanzdienstleister, leitet…

