Tag: ciso
-
CSO in eigener Sache: Mit Smart Answers zu mehr Information
Mit Smart Answers werden alle Ihre Fragen bei uns auf der CSO-Website beantwortet.Wie können CISOs ihre Karriere pushen? Welche Auswirkungen haben Ransomware-Angriffe auf Unternehmen? Wie läuft die Kommunikation nach einem Cyberangriff ab? Diese und viele weitere Fragen beantworten wir Ihnen auf der Website der CSO über unser neues KI-Tool “Smart Answers”.
-
New York Hospital Cyber Rules to ‘Raise the Bar’ Nationwide
New York State’s stringent new cybersecurity requirements for many hospitals will have a ripple effect, raising the security bar and expectations for healthcare providers across many other states, predicts Chris Stucker, deputy CISO at Wisconsin-based Froedtert ThedaCare Health. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/new-york-hospital-cyber-rules-to-raise-bar-nationwide-i-5504
-
Gigamon-Umfrage unter CISOs – Metadaten sind die Eckpfeiler der Sicherheitsstrategien für 2026
Tags: cisoFirst seen on security-insider.de Jump to article: www.security-insider.de/ki-cybersicherheit-cisos-herausforderungen-a-0f62b5baf2e0c43132120d6ae4d85d3b/
-
A CISO’s Perspective on Scaling GenAI Securely
Going Beyond the Copilot Pilot – A CISO’s Perspective. With 60% of businesses piloting M365 Copilot but only 6% scaling, this webinar explores why gen AI deployments stall, and what CISOs and IT leaders must know to roll out secure, compliant, and effective AI productivity tools. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/cisos-perspective-on-scaling-genai-securely-a-30141
-
Heineken CISO champions a new risk mindset to unlock innovation
In this Help Net Security interview, Marina Marceta, CISO at Heineken, discusses what it takes for CISOs to be seen as business-aligned leaders rather than technical … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/26/marina-marceta-heineken-business-aligned-security/
-
How board members think about cyber risk and what CISOs should tell them
In this Help Net Security video, Jonathan Trull, EVP CISO at Qualys, discusses which cybersecurity metrics matter most to a board of directors. Drawing on more than two … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/26/cybersecurity-metrics-for-boards-video/
-
How board members think about cyber risk and what CISOs should tell them
In this Help Net Security video, Jonathan Trull, EVP CISO at Qualys, discusses which cybersecurity metrics matter most to a board of directors. Drawing on more than two … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/26/cybersecurity-metrics-for-boards-video/
-
Agentic AI die besten Security-Anwendungsfälle
Tags: access, ai, authentication, breach, ceo, ciso, cyber, cyberattack, cybersecurity, cyersecurity, defense, detection, fraud, identity, network, office, phishing, risk, scam, service, soc, strategy, threat, vulnerability, zero-trustKI-Agenten können Security-Profis den Arbeitsalltag deutlich erleichtern. Lesen Sie, wie. Agentic-AI-Systeme führen Aufgaben selbständig und ohne manuelle Eingriffe aus. Dieses Grundprinzip dürfte nicht wenige CISOs und Sicherheitsexperten erst einmal eher abschrecken. Allerdings entdecken immer mehr Security-Experten, dass Agentic AI wesentlich weniger komplex und schwierig zu implementieren ist, als angenommen und Cybersecurity-Prozesse in besonderem Maße bereichern…
-
Find the Invisible: Salt MCP Finder Technology for Proactive MCP Discovery
The conversation about AI security has shifted. For the past year, the focus has been on the model itself: poisoning data, prompt injection, and protecting intellectual property. These are critical concerns, but they miss the bigger picture of how AI is actually being operationalized in the enterprise. We are entering the era of Agentic AI.…
-
7 signs your cybersecurity framework needs rebuilding
Tags: ai, awareness, best-practice, breach, business, ceo, ciso, cloud, compliance, cyberattack, cybersecurity, data, detection, endpoint, finance, firmware, framework, Hardware, healthcare, incident response, mobile, network, nist, privacy, risk, risk-management, service, software, strategy, supply-chain, threat, tool, training2. Experiencing a successful cyberattack, of any size: Nothing highlights a weak cybersecurity framework better than a breach, says Steven Bucher, CSO at Mastercard. “I’ve seen firsthand how even a minor incident can reveal outdated protocols or gaps in employee training,” he states. “If your framework hasn’t kept pace with evolving threats or business needs,…
-
Sweet Security Raises $75M for Unified AI and Cloud Defense
Israeli Startup Plans to Integrate AI Agent Guardrails Into Cloud Platform. Sweet Security secured $75 million in Series B funding to integrate AI security into its CNAPP platform. With runtime protection as its differentiator, the startup plans to address growing CISO concerns over shadow AI and attack vectors involving intelligent agents. First seen on govinfosecurity.com…
-
Sweet Security Raises $75M for Unified AI and Cloud Defense
Israeli Startup Plans to Integrate AI Agent Guardrails Into Cloud Platform. Sweet Security secured $75 million in Series B funding to integrate AI security into its CNAPP platform. With runtime protection as its differentiator, the startup plans to address growing CISO concerns over shadow AI and attack vectors involving intelligent agents. First seen on govinfosecurity.com…
-
CISOs Get Real About Hiring in the Age of AI
Dark Reading Confidential Episode 12: Experts help cyber job seekers get noticed, make an argument for a need to return to the hacker ethos of a bygone era, and have a stark conversation about keeping AI from breaking the sector’s talent pipeline for years to come. First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/ciscos-get-real-about-hiring-age-ai
-
Ex-CISA officials, CISOs dispel ‘hacklore,’ spread cybersecurity truths
Don’t believe everything you read First seen on theregister.com Jump to article: www.theregister.com/2025/11/24/hacklore_launch/
-
Ex-CISA officials, CISOs dispel ‘hacklore,’ spread cybersecurity truths
Don’t believe everything you read First seen on theregister.com Jump to article: www.theregister.com/2025/11/24/hacklore_launch/
-
2026 CSO Hall of Fame call for nominations
Tags: ceo, cio, ciso, corporate, cybersecurity, finance, google, group, infrastructure, international, jobs, risk, risk-management, sans, technology2025 CSO Hall of Fame Honorees Meg Anderson, VP & CISO (retired), Principal Financial Group Bob Bruns, CISO, Avanade Jonathan Chow, CISO, Genesys Mignona Cote, CISO, Infor Laura Deaner, Managing Director, CISO, The Depository Trust & Clearing Corporation (DTCC) George Finney, CISO, University of Texas System Michael Gordon, SVP & CISO, McDonald’s Ron Green, Cybersecurity Fellow/Former CSO, Mastercard Shawn Henry, CSO, CrowdStrike Todd Lukens,…
-
2026 CSO Hall of Fame call for nominations
Tags: ceo, cio, ciso, corporate, cybersecurity, finance, google, group, infrastructure, international, jobs, risk, risk-management, sans, technology2025 CSO Hall of Fame Honorees Meg Anderson, VP & CISO (retired), Principal Financial Group Bob Bruns, CISO, Avanade Jonathan Chow, CISO, Genesys Mignona Cote, CISO, Infor Laura Deaner, Managing Director, CISO, The Depository Trust & Clearing Corporation (DTCC) George Finney, CISO, University of Texas System Michael Gordon, SVP & CISO, McDonald’s Ron Green, Cybersecurity Fellow/Former CSO, Mastercard Shawn Henry, CSO, CrowdStrike Todd Lukens,…
-
What keeps CISOs awake at night, and why Zurich might hold the cure
Tags: access, ai, api, attack, breach, ciso, conference, control, cve, cyber, cybersecurity, deep-fake, detection, endpoint, exploit, finance, firmware, framework, group, incident response, injection, LLM, malware, mandiant, microsoft, mitre, network, phishing, phone, ransomware, resilience, risk, soc, strategy, supply-chain, threat, tool, training, update, zero-dayA safe space in the Alps: Over two days at Zurich’s stunning Dolder Grand, hosted by the Swiss Cyber Institute, I witnessed something I’ve seldom seen at cybersecurity events: real vulnerability. In a closed, attribution-free environment, leaders shared not just strategies, but doubts. And that made this event stand out, not as another conference, but…
-
What keeps CISOs awake at night, and why Zurich might hold the cure
Tags: access, ai, api, attack, breach, ciso, conference, control, cve, cyber, cybersecurity, deep-fake, detection, endpoint, exploit, finance, firmware, framework, group, incident response, injection, LLM, malware, mandiant, microsoft, mitre, network, phishing, phone, ransomware, resilience, risk, soc, strategy, supply-chain, threat, tool, training, update, zero-dayA safe space in the Alps: Over two days at Zurich’s stunning Dolder Grand, hosted by the Swiss Cyber Institute, I witnessed something I’ve seldom seen at cybersecurity events: real vulnerability. In a closed, attribution-free environment, leaders shared not just strategies, but doubts. And that made this event stand out, not as another conference, but…
-
The CISO’s greatest risk? Department leaders quitting
What CISOs can and should be doing: The situation isn’t hopeless; there are steps CISOs can and should take to help avoid defections. It’s a matter of making staff a priority. PayNearMe’s Hobson says CISOs need to ask themselves whether functional security leaders are wearing too many hats with too few opportunities to advance, and…
-
Email blind spots are back to bite security teams
The threat landscape is forcing CISOs to rethink what they consider normal. The latest Cybersecurity Report 2026 by Hornetsecurity, based on analysis of more than 70 billion … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/11/24/hornetsecurity-email-attack-tactics-report/
-
SEC Ends SolarWinds Suit After Major Legal Setbacks
High-Profile Case Ends After Judge Guts SEC’s Cyber Fraud Allegations. The SEC has dropped its remaining claims against SolarWinds and CISO Tim Brown, ending a controversial cyber fraud lawsuit that aimed to expand securities law to cover operational security failures tied to the 2020 Russian hacking campaign. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/sec-ends-solarwinds-suit-after-major-legal-setbacks-a-30101
-
SEC Dismisses Remains of Lawsuit Against SolarWinds and Its CISO
The SEC dismissed the remain charges in the lawsuit filed in 2023 against software maker SolarWinds and CISO Timothy Brown in the wake of the massive Sunburst supply chain attack, in which a Russian nation-state group installed a malicious update into SolarWInds software that then compromised the systems of some customers. First seen on securityboulevard.com…
-
SEC Dismisses Remains of Lawsuit Against SolarWinds and Its CISO
The SEC dismissed the remain charges in the lawsuit filed in 2023 against software maker SolarWinds and CISO Timothy Brown in the wake of the massive Sunburst supply chain attack, in which a Russian nation-state group installed a malicious update into SolarWInds software that then compromised the systems of some customers. First seen on securityboulevard.com…
-
SOCs Must Be Built for Speed in the AI Threat Era
KPMG’s John Israel on Speed, Autonomy and Trusted AI in Security. The adversarial use of AI has dramatically compressed attack timelines, forcing organizations to rethink their security operations centers. John Israel, global CISO at KPMG, discusses how companies must reshape their SOC programs around speed, increased automation and governance. First seen on govinfosecurity.com Jump to…
-
Cybersecurity Snapshot: Global Agencies Target Criminal “Bulletproof” Hosts, as CSA Unveils Agentic AI Risk Framework
Tags: access, advisory, ai, android, apple, attack, banking, breach, browser, chrome, cisa, ciso, cloud, compliance, control, credentials, credit-card, crypto, cve, cyber, cybercrime, cybersecurity, data, defense, detection, endpoint, extortion, finance, firewall, firmware, flaw, framework, google, governance, government, group, guide, Hardware, ibm, identity, infection, infrastructure, international, Internet, law, linux, malicious, malware, microsoft, mobile, monitoring, network, open-source, oracle, password, phishing, radius, ransomware, rat, resilience, risk, risk-assessment, risk-management, russia, scam, service, software, switch, technology, threat, tool, update, vulnerability, windowsCyber agencies call on ISPs to help combat “bulletproof” internet hosts that shield cybercriminals. Meanwhile, the CSA introduced a new methodology to assess the risks of autonomous AI. Plus, get the latest on the CIS Benchmarks, drone-detection systems, and malware infections. Key takeaways Crackdown on “bulletproof” hosting: International cyber agencies are urging ISPs and network…
-
From code to boardroom: A GenAI GRC approach to supply chain risk
Tags: ai, blockchain, business, ciso, compliance, dark-web, data, defense, finance, framework, gartner, grc, intelligence, LLM, metric, open-source, regulation, resilience, risk, strategy, supply-chain, threat, vulnerabilityThe GenAI GRC mandate: From reporting to prediction: To counter a threat that moves at the speed of computation, our GRC must also become generative and predictive. The GenAI GRC mandate is to shift the focus from documenting compliance to predicting systemic failure.Current GRC methods are designed for documentation. They verify that a policy exists.…
-
How to turn threat intel into real security wins
Tags: access, api, attack, automation, awareness, business, ciso, cloud, communications, control, credentials, csf, data, data-breach, detection, dns, edr, email, endpoint, exploit, finance, framework, governance, guide, identity, intelligence, lessons-learned, mail, malware, mitre, nist, phishing, ransomware, resilience, risk, saas, siem, soar, soc, switch, tactics, theft, threat, tool, update, vulnerabilityThe CISO mandate: Risk, efficiency, investment, response: Reduce operational risk and financial loss Intelligence-led detection and response aim to prevent or minimise data loss and business disruption. The downstream effects, smaller blast radii, fewer regulatory headaches and lower recovery bills, are what boards recognise. Maximise staff efficiency Manual validation and correlation drive alert fatigue. Automating…
-
From code to boardroom: A GenAI GRC approach to supply chain risk
Tags: ai, blockchain, business, ciso, compliance, dark-web, data, defense, finance, framework, gartner, grc, intelligence, LLM, metric, open-source, regulation, resilience, risk, strategy, supply-chain, threat, vulnerabilityThe GenAI GRC mandate: From reporting to prediction: To counter a threat that moves at the speed of computation, our GRC must also become generative and predictive. The GenAI GRC mandate is to shift the focus from documenting compliance to predicting systemic failure.Current GRC methods are designed for documentation. They verify that a policy exists.…

