Tag: ciso
-
More money is going to physical security, but it’s often CISOs that oversee it: EY
Organizations should centralize physical security and cybersecurity so both are adequately prepared for, the consulting firm says in a survey report. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/more-money-physical-security-cisos-oversee/820240/
-
More money is going to physical security, but it’s often CISOs that oversee it: EY
Organizations should centralize physical security and cybersecurity so both are adequately prepared for, the consulting firm says in a survey report. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/more-money-physical-security-cisos-oversee/820240/
-
What CISOs need to land a board role
Tags: business, ciso, control, corporate, cyber, cybersecurity, finance, governance, government, intelligence, jobs, resilience, risk, skills, strategy, trainingTips for CISOs aiming for a board role: For CISOs interested in contributing to global vendor boards, Morelli advises focusing on becoming a partner, not just a customer. This requires the ability to articulate how a product’s evolution impacts the risk profile of an entire sector.For non-industry or public boards, CISOs must be comfortable contributing…
-
Palo Alto Networks bets on identity security for autonomous AI with Idira launch
Tags: ai, attack, business, ceo, ciso, cloud, credentials, cybersecurity, governance, identity, injection, intelligence, least-privilege, mfa, network, RedTeam, risk, soc, threat, tool, vulnerabilityCISOs navigate AI risks: For enterprises, the launch reflects a broader industry shift toward identity-centric cybersecurity models as organizations deploy generative AI tools, autonomous agents, and cloud-native applications at scale.Analysts say the growing number of non-human identities is creating operational and security challenges because many existing identity systems were originally built to manage employees and…
-
20 Leaders Who Built the CISO Era: 2 Decades of Change
As part of Dark Reading’s 20th anniversary special coverage, we profile the CISOs, founders, researchers, criminals, and policymakers who rewrote the enterprise risk playbook. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/20-leaders-ciso-era-2-decades-change
-
Why patching SLAs should be the floor, not the strategy
SLAs measure discipline, not risk: Here’s the mental model I’ve been pushing with my peers. Think of patching SLAs the way you think of fire drills. Fire drills are necessary. They prove that, on a predictable cadence, your organization can execute a known procedure. No one in charge of a building full of people would…
-
8 guiding principles for reskilling the SOC for agentic AI
Tags: ai, automation, business, ciso, cyber, cybersecurity, data, governance, incident response, jobs, penetration-testing, sans, skills, soc, technology, tool, training, update, vulnerability, vulnerability-managementSet the tone from the top: The second principle for reskilling security teams for agentic AI is all about leadership.As Baker says, CISOs must set the tone. That means building a culture of rapid experimentation, iteration, and innovation. “Fail fast and move forward,” he says.A key aspect of CISO leadership is understanding the needs of…
-
Implementierung von Passkeys Ein Leitfaden von Sophos für CISOs
Die Einführung von Passkeys in einem Unternehmen kann für CISOs und die IT-Teams eine komplexe Aufgabe sein. Technologische Beschränkungen, mangelnde Akzeptanz oder gestörte Workflows sind nur einige der Tücken, die bei der Sicherheitsoptimierung für digitale Identitäten auftreten können. Sophos hat jetzt ein kompaktes Playbook für CISOs und technische Verantwortliche erstellt, das neben einem praktischen Leitfaden zur…
-
CISOs: Align cyber risk communication with boardroom psychology
Tags: breach, business, ciso, compliance, control, cyber, cybersecurity, data, finance, governance, psychology, resilience, risk, threat, updateStop reporting risk as a technical status update: Executives do not need a master class in threat modeling. They need to know what the business stands to lose.Risk has to be framed in terms boards already use to weigh other enterprise decisions: financial exposure, operational disruption, compliance consequences, legal risk and the cost of delay.…
-
Poisoned truth: The quiet security threat inside enterprise AI
It takes surprisingly little poison to corrupt: Bad internal data is the immediate problem. But the external supply chain may be even harder to control.Research by Anthropic, the UK AI Security Institute, and the Alan Turing Institute discovered that as few as 250 maliciously crafted documents can poison LLMs of any size.That creates a massive…
-
Skills Gap Top CISO Concern, Says New SANS Survey
Security Leaders Face Gaps, Not in Their Org Charts, But in Their Team’s Skills. Concerns about the skills and capabilities of cybersecurity teams have for the first time overtaken worries about headcount and unfilled vacancies among CISOs, according to a new SANS survey. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/skills-gap-top-ciso-concern-says-new-sans-survey-a-31603
-
CISOs step up to the security workforce challenge
Tags: ai, attack, automation, ciso, conference, control, cyber, cyberattack, cybersecurity, jobs, malicious, risk, skills, strategy, technology, threat, tool, trainingGomez-Sanchez and Turpin are speaking at the CSO Cybersecurity Awards & Conference, May 11-13. Reserve your place. And then there’s AI. When it comes to security, AI may help partially offset cyber skills shortages by automating certain tasks, but it also ramps up cyberattack volumes and expands the organizational attack surface, without fixing CISOs’ ongoing talent…
-
The fake IT worker problem CISOs can’t ignore
Tags: access, ai, breach, business, captcha, cio, ciso, compliance, computer, control, credentials, crowdstrike, data, detection, edr, endpoint, fedramp, fraud, gartner, iam, identity, jobs, linkedin, mitigation, monitoring, network, north-korea, office, phone, risk, skills, tool, training, zero-trustWhat to do if you suspect a fake IT worker: When a CIO suspects a fake IT worker, next steps are important as the issue shifts from recruitment to insider risk management.During his time at MongoDB, George Gerchow, IANS faculty advisor and Bedrock Data CSO, oversaw the investigation after the company detected it had unknowingly…
-
How CISOs should utilize data security posture management to inform risk
Tags: access, ai, automation, business, ciso, compliance, control, cyber, data, detection, finance, iam, incident response, monitoring, open-source, remote-code-execution, risk, service, siem, software, tool, update, vulnerabilityApplying the principles at any maturity level: Whether you’re working with a full DSPM platform, a lightweight open-source scanner or even manual data inventories, CISOs can use this thinking to apply quantification (or at least an order of magnitude) to risk decisions. For example, you may have a written policy in place that a database…
-
A Tale of Two States: The 2026 Cybersecurity Paradox
The cyber threat outlooks from CIOs and CISOs at the NASCIO Midyear Conference in Philadelphia ranged from the good to the bad to the ugly, with AI front and center. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/05/a-tale-of-two-states-the-2026-cybersecurity-paradox/
-
CISO Diaries: Victor-Andrei Nicolae on Practical Security, Patience, and AI-Driven Defense
Security leadership is often associated with emerging threats and advanced technologies, but much of the role comes down to disciplined execution, thoughtful decision-making, and balancing protection with business continuity. In CISO Diaries, we speak with leading CISOs around the world to understand what the role actually looks like beyond frameworks and incident headlines, how security…The…
-
Windows shell spoofing vulnerability puts sensitive data at risk
A difficult balance: Erik Avakian, technical counselor at Info-Tech Research Group, noted that when it set the patching deadline, CISA had been operating within the guidelines laid down in Binding Operational Directive (BOD) 22-01, which requires US federal agencies to patch vulnerabilities within the timelines outlined under the policy, which range from 14 to 21…
-
Vulnerability remediation: Match CVEs to asset owners in seconds with Tenable Hexa AI
Tags: access, ai, api, attack, automation, business, ciso, compliance, control, cve, cybersecurity, data, exploit, framework, group, identity, Internet, login, nist, okta, service, supply-chain, threat, update, vulnerability, vulnerability-managementDetecting a vulnerability is easy. Finding the person responsible for fixing it is where remediation programs often break down. See how Tenable Hexa AI uses MCP to connect your exposure data to your identity provider, automating the hunt for asset owners in seconds. Key takeaways The accountability gap is the real bottleneck. Finding a vulnerability…
-
Just 34% of cyber pros plan to stick with their current employer
Skills development: Richard Demeny, founder and CTO at Canary Wharfian, an online finance career platform, says that graduates and early professionals know they are calling the shots because even at the entry level talent is scarce.”[New entrants] are prioritizing opportunity and learnings, as pay is pretty much standard across the board, except for maybe high-finance…
-
State CISOs Are Losing Confidence as AI Threats Surge
Tightening Budgets and AI-Enabled Attacks Stretch State Cyber Defenses. State CISO confidence has collapsed, with just 22% saying their data is protected from cyberthreats. The 2026 NASCIO-Deloitte study points to AI-enabled attacks, third-party vendor risk and the worst budget picture in years as states rethink how they defend public data. First seen on govinfosecurity.com Jump…
-
State CISOs Are Losing Confidence as AI Threats Surge
Tightening Budgets and AI-Enabled Attacks Stretch State Cyber Defenses. State CISO confidence has collapsed, with just 22% saying their data is protected from cyberthreats. The 2026 NASCIO-Deloitte study points to AI-enabled attacks, third-party vendor risk and the worst budget picture in years as states rethink how they defend public data. First seen on govinfosecurity.com Jump…
-
‘The AI Vulnerability Storm” – 250 CISOs veröffentlichen AI-Strategie-Briefing
First seen on security-insider.de Jump to article: www.security-insider.de/ai-schwachstellen-stunden-ciso-plan-csa-sans-a-db07c3da7f4d7cdf35951cfbbf52d283/
-
ODNI to CISOs on threat assessments: You’re on your own
Tags: access, ai, china, ciso, computer, control, credentials, cyber, cybercrime, data, defense, detection, disinformation, encryption, finance, framework, government, healthcare, identity, infrastructure, intelligence, iran, jobs, korea, metric, resilience, risk, russia, service, strategy, technology, theft, threat, tool, warfareThe bifurcated framework: Operational reporting vs. homeland focus: The report now operates on two distinct tracks that risk narrowing the threat horizon for CROs. In a departure from traditional probabilistic forecasting, the IC has transitioned toward active operational reporting. This shift prioritizes immediate success metrics, such as a significant drop in border encounters and fentanyl…
-
ODNI to CISOs on threat assessments: You’re on your own
Tags: access, ai, china, ciso, computer, control, credentials, cyber, cybercrime, data, defense, detection, disinformation, encryption, finance, framework, government, healthcare, identity, infrastructure, intelligence, iran, jobs, korea, metric, resilience, risk, russia, service, strategy, technology, theft, threat, tool, warfareThe bifurcated framework: Operational reporting vs. homeland focus: The report now operates on two distinct tracks that risk narrowing the threat horizon for CROs. In a departure from traditional probabilistic forecasting, the IC has transitioned toward active operational reporting. This shift prioritizes immediate success metrics, such as a significant drop in border encounters and fentanyl…
-
What We Do in the Shadows: How CISOs Can Crack Down on Shadow AI
Shadow AI is spreading across enterprises as employees use AI tools without oversight, creating new data security and compliance risks. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/04/what-we-do-in-the-shadows-how-cisos-can-crack-down-on-shadow-ai/

