Tag: ciso
-
6 wichtige Punkte für Ihren Incident Response Plan
Tags: backup, business, ceo, ciso, compliance, cyber, cyberattack, cybersecurity, cyersecurity, finance, incident response, mail, ransomware, risk, security-incident, service, strategy, supply-chain, updateLesen Sie, welche Schritte für Ihren Notfallplan besonders wichtig sind.Wenn ein Unternehmen einen größeren Ausfall seiner IT-Systeme erlebt beispielsweise aufgrund eines Cyberangriffs ist es zu diesem Zeitpunkt nicht mehr voll geschäftsfähig. Deshalb ist ein effektiver Plan zur Reaktion auf Vorfälle (Incident Response, IR) unerlässlich.Es geht jedoch nicht nur darum, die Quelle eines Angriffs zu finden…
-
Cybersecurity classics: 10 books that shaped the industry
Cybersecurity constantly evolves, but some books have stood the test of time, shaping how professionals think about security, risk, and digital threats. Whether you’re a CISO, … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/13/cybersecurity-classics-books/
-
The CISO as Business Resilience Architect
To truly become indispensable in the boardroom, CISOs need to meet the dual demands of defending against sophisticated adversaries while leading resilience strategies. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/ciso-business-resilience-architect
-
The cybersecurity product sales process is broken, but it doesn’t have to be
Breaking the cycle of poor vendor-CISO relationships: First and foremost, both sides need to embrace empathy and candor as foundational principles. Vendors must approach every conversation with empathy, recognizing that engaging with sellers is often just 10 to 20% of a CISO’s time, while engaging with CISOs may represent 90% of a seller’s focus.Sellers need…
-
Burnout in cybersecurity: How CISOs can protect their teams (and themselves)
Cybersecurity is a high-stakes, high-pressure field in which CISOs and their teams constantly battle threats, compliance requirements, and business expectations. The demand … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/12/cybersecurity-burnout-ciso/
-
Lessons from the Field, Part III: Why Backups Alone Won’t Save You
James Keiser, Director of Secured Managed Services Southeast, CISO Global, Inc. It’s been a while since I’ve put some thoughts together for the CISO Blog, and with World Backup Day coming at the end of this month, the timing felt right. I’ve mentioned in the past that backups are crucial to keeping your data preserved……
-
Musk links cyberattack on X to Ukraine without evidence
Nation-state involvement is possible: While very less is known about the attack, despite a bunch of revelations, experts think a nation-state involvement is indeed possible.”X is under relentless cyberattacks: 24/7/365 and this is far beyond simple DoS attempts,” said Chad Cragle, CISO at DeepWatch. “While technical issues can occur, X’s engineers understand scalability and redundancy.…
-
Security operations centers are fundamental to cybersecurity, here’s how to build one
Tags: access, ai, automation, ciso, compliance, cyber, cybersecurity, data, detection, edr, endpoint, governance, group, guide, iam, identity, incident response, intelligence, jobs, network, risk, service, siem, soar, soc, threat, toolBreakdown of SOC tools and technologies: During their Shmoocon talk, Wyler and his colleague James “Pope” Pope, senior manager of governance, risk, and compliance at Corelight, offered a list of the fundamental technologies CISOs should consider when building or outsourcing a SOC.These essential tools include: EDR (endpoint detection and response) EDR is a security solution…
-
Smart cybersecurity spending and how CISOs can invest where it matters
CISOs face mounting pressure to spend wisely on security. Yet, many organizations remain vulnerable due to misplaced priorities and inefficient budgeting. This article … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/11/ciso-smart-cybersecurity-spending/
-
How remote work strengthens cybersecurity teams
The global transition to remote work has reshaped traditional workplace dynamics, introducing challenges and opportunities for cybersecurity teams. For CISOs and security … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/11/remote-work-cybersecurity-teams/
-
CISOs müssen OT-Risiken stärker adressieren
Tags: china, ciso, cyber, cyberattack, exploit, firewall, hacker, infrastructure, Internet, iran, kev, kritis, military, ransomware, risk, technology, update, vulnerabilityDa Angriffe auf OT-Bereiche zunehmen, sollten CISOs einen Exposure-Management-Ansatz verfolgen.Die Bedrohungen gegen die Betriebstechnik (Operational Technology, OT) der kritischen Infrastruktur (KRITIS) verschärfen sich kontinuierlich. China baut offensive Komponenten in amerikanische Militär- und Unternehmensnetzwerke ein. Zudem haben chinesische Hacker Telekommunikationsunternehmen und Internetdienstleister infiltriert, um Zivilisten auszuspionieren. Seit etlichen Jahren, also bereits deutlich vor dem Angriffskrieg, greift…
-
How CISOs are tackling cyber security challenges
Security chiefs at the recent Gartner Security and Risk Management Summit in Sydney share insights on navigating board communication, organisational resilience and the importance of understanding business needs First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366620535/How-CISOs-are-tackling-cyber-security-challenges
-
CISOs and CIOs forge vital partnerships for business success
Tags: advisory, ai, attack, breach, business, ceo, cio, ciso, cloud, communications, corporate, cybersecurity, data, data-breach, finance, firewall, framework, ibm, infrastructure, resilience, risk, risk-management, service, strategy, technology, threatVikram Nafde, EVP and CIO, Webster Bank Webster BankAs is the case at many companies, Webster Bank’s CISO Patty Voight reports into the CIO. While there is a direct line between the executive functions, Nafde says the structure is collaborative, not hierarchical, a significant evolution as the intensity of threats escalate, raising the bar for…
-
Week in review: How QR code attacks work and how to protect yourself, 10 must-reads for CISOs
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: How QR code attacks work and how to protect yourself While QR codes are … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/09/week-in-review-how-qr-code-attacks-work-and-how-to-protect-yourself-10-must-reads-for-cisos/
-
How AI in Healthcare Can Speed Up Cyber Response
Artificial intelligence-based tools are among the most promising advancing technologies for healthcare sector organizations to help to address cybersecurity resource shortages, said Chris Tyberg, CISO of medical device and consumer health product manufacturer Abbott. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/how-ai-in-healthcare-speed-up-cyber-response-i-5463
-
Reshaping Healthcare – and Healthcare Cyber – With AI
The use of artificial intelligence is not only reshaping healthcare delivery in the sector but also healthcare cybersecurity within organizations, said Anahi Santiago, CISO of ChristianaCare, the largest healthcare delivery organization in the state of Delaware. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/reshaping-healthcare-healthcare-cyber-ai-i-5465
-
Leitfaden für Abwehrspezialisten
Akamai Technologies veröffentlicht den Leitfaden für Abwehrspezialisten 2025: . Dieser neuartige SOTI-Bericht (State of the Internet) bietet Forschungsergebnisse aus der Praxis. Mit Erkenntnissen zu Themen wie Risikobewertung, VPN-Missbrauch und fortschrittlichen Malware-Techniken können Unternehmen ihre Cybersicherheitsstrategie verbessern. Für CISOs besonders spannend: Der Bericht beschreibt detaillierte Sicherheitsstrukturen mit proaktiven Maßnahmen, die […] First seen on netzpalaver.de Jump…
-
What is risk management? Quantifying and mitigating uncertainty
Tags: breach, business, cio, ciso, compliance, control, cyber, cyberattack, data, finance, flaw, framework, governance, healthcare, infosec, infrastructure, insurance, international, jobs, mitigation, monitoring, nist, risk, risk-analysis, risk-assessment, risk-management, software, strategy, technology, tool, vulnerabilityHow do organizations structure risk management operations?: Risk management has in some organizations traditionally been multicentric, with different departments or individuals within the org implementing risk management techniques in their work: Risk management is a component of good project management, for instance. IT leaders in particular must be able to integrate risk management philosophies and…
-
What are the key security controls for NHIs at the executive level?
Why Should CISOs Consider Non-Human Identities Security Controls? Did you know NHIs represent a significant portion of all entities in a typical network environment? A lack of robust Non-Human Identities (NHIs) security controls can pose significant threats to data integrity and system security in any organization. You must be wondering What are the key… First…
-
CISOs und CIOs auf dem Weg zur Cyber-Resilienz durch Data-Governance-Strategien leiten
Data Governance ebnet den Weg für Data Resilience. Durch die Datenklassifizierung können Unternehmen Lücken in ihren Business-Continuity-Plänen aufdecken und als zusätzlichen Vorteil ihre laufenden Tagesabläufe verbessern First seen on infopoint-security.de Jump to article: www.infopoint-security.de/cisos-und-cios-auf-dem-weg-zur-cyber-resilienz-durch-data-governance-strategien-leiten/a40058/
-
Why Security Leaders Are Opting for Consulting Gigs
Tags: cisoMany CISOs are weighing the benefits of going virtual as a consultant. Can the pendulum swing in the other direction? First seen on darkreading.com Jump to article: www.darkreading.com/cybersecurity-operations/why-security-leaders-opting-consulting-gigs
-
‘Cocktail of Cyber-Risk’ Should Stir Concerns Among CISOs
A global report published by the World Economic Forum points to a new world order characterized by greater instability, polarizing narratives, eroding trust, and insecurity. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/thinking-outside-box-cyber-risk
-
Thinking Outside the Box on Cyber-Risk
CISOs should add more to their vision than technology as a global report published by the World Economic Forum identifies a closely interconnected cocktail of risk. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/thinking-outside-box-cyber-risk
-
Why multi-cloud security needs a fresh approach to stay resilient
As enterprises expand their multi-cloud strategies to drive agility and scalability, CISOs must prioritize cyber resilience across diverse cloud platforms. The complexities of … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/05/multi-cloud-security-approach-stay-resilient/
-
Conquering Cyber Risks Involving Web Browsers in Healthcare
As clinicians move to a model of working anywhere, on many types of devices and under a variety of different internet environments, web browser security is a heightened concern, said John Frushour, vice president and CISO at New York Presbyterian Hospital and CyberEdBoard member. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/conquering-cyber-risks-involving-web-browsers-in-healthcare-i-5460
-
eBook: What does it take to be a full-fledged virtual CISO?
Virtual Chief Information Security Officer (vCISO) services are in high demand. Even though it is clear to all that this trend is growing, most service providers only offer a … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/04/ebook-what-does-it-take-to-be-a-full-fledged-virtual-ciso/
-
CISO Liability Risks Spur Policy Changes at 93% of Organizations
Fastly found that organizations have introduced changes such as increasing CISO participation in strategic decisions in response to growing personal liability risks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/ciso-liability-risks-policy-changes/

