Tag: ciso
-
World Economic Forum spotlights growing gap in cyber readiness
Ransomware remains the top cyber risk concern among executives, but CISOs are almost twice as likely as CEOs to make that determination. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/wef-cyber-risk-outlook/737430/
-
The CFO may be the CISO’s most important business ally
CISOs frequently encounter inherent conflicts with business colleagues in their day-to-day responsibilities. In many ways, this is the nature of setting security policies for an organization. But the goal for CISOs should be to reset this dynamic and forge a strong, collaborative alliance with their critical leadership counterparts.Take the CFO, for example. For many CISOs,…
-
Stop wasting money on ineffective threat intelligence: 5 mistakes to avoid
Tags: business, ciso, compliance, cyber, cybersecurity, data, detection, edr, finance, group, incident response, infrastructure, intelligence, jobs, malware, monitoring, risk, risk-management, siem, soc, strategy, tactics, technology, threat, tool, update, vulnerability, vulnerability-managementStrong capabilities in cyber threat intelligence (CTI) can help take a cybersecurity program to the next level on many different fronts. When organizations choose quality sources of threat intelligence that are relevant to their technology environments and their business context, these external sources can not only power swifter threat detection but also help leaders better…
-
Note to CISOs: Mobile devices are endpoints!
First seen on scworld.com Jump to article: www.scworld.com/perspective/note-to-cisos-mobile-devices-are-endpoints
-
Beware cybersecurity tech that’s past its prime, 5 areas to check or retire
Tags: access, advisory, ai, antivirus, attack, authentication, breach, bug-bounty, ciso, cloud, control, credentials, cyberattack, cybersecurity, data, data-breach, defense, detection, encryption, endpoint, firewall, Hardware, network, password, penetration-testing, risk, router, siem, software, strategy, switch, threat, tool, vpn, vulnerability, waf, zero-trustCybersecurity leaders can choose from an ever-expanding list of digital tools to help them ward off attacks and, based on market projections, they’re implementing plenty of those options.Gartner predicts a 15% increase in cybersecurity spending for 2025, with global expenditures expected to reach $212 billion in the upcoming year. The research and consulting firm says…
-
This is the year CISOs unlock AI’s full potential
In 2025, CISOs will have powerful new capabilities as generative artificial intelligence (GenAI) continues to mature. Evolving beyond providing answers to questions, GenAI … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/01/14/genai-cisos/
-
Conveying Your Security Needs to the Board in Six Minutes or Less
Tags: cisoCISOs must take advantage by making the most of their limited time with effective and informative messaging. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/conveying-your-security-needs-to-the-board-in-six-minutes-or-less/
-
CISOs embrace rise in prominence, with broader business authority
Tags: ai, attack, business, ceo, cio, ciso, compliance, control, corporate, cyber, cyberattack, cybersecurity, data, governance, healthcare, infrastructure, intelligence, network, privacy, regulation, risk, risk-management, security-incident, strategy, technology, threat, updateIt’s a familiar refrain: As cybersecurity has become a core business priority, it is no longer a siloed operation, and the responsibilities of CISOs have grown, giving them greater prominence within the organization.According to CSO’s 2024 Security Priorities Study, 72% of security decision-makers say their role has grown to include additional responsibilities over the past…
-
GitHub CISO on security strategy and collaborating with the open-source community
In this Help Net Security, Alexis Wales, CISO at GitHub, discusses how GitHub embeds security into every aspect of its platform to protect millions of developers and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/01/13/alexis-wales-github-ciso-security-strategy/
-
Payback-CISO: ‘Vorbereitung ist das A und O”
Tags: automation, awareness, ciso, cyberattack, cyersecurity, firewall, germany, hacking, infrastructure, mail, nis-2, phishing, ransomware, risk, security-incident, strategy, tool, trainingsrcset=”https://b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?quality=50&strip=all 6016w, b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=300%2C168&quality=50&strip=all 300w, b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=768%2C432&quality=50&strip=all 768w, b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=1024%2C576&quality=50&strip=all 1024w, b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=1536%2C864&quality=50&strip=all 1536w, b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=2048%2C1152&quality=50&strip=all 2048w, b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=1240%2C697&quality=50&strip=all 1240w, b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=150%2C84&quality=50&strip=all 150w, b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=854%2C480&quality=50&strip=all 854w, b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=640%2C360&quality=50&strip=all 640w, b2b-contenthub.com/wp-content/uploads/2025/01/Nawid-Sayed.jpg?resize=444%2C250&quality=50&strip=all 444w” width=”1024″ height=”576″ sizes=”(max-width: 1024px) 100vw, 1024px”>Nawid Sayed, CISO bei Payback: “Um sich vor Cyberattacken zu schützen, gibt es nicht das eine Tool, sondern der Prozess ist hier entscheidend.” PaybackWelches Thema ist aus Ihrer…
-
SEC rule confusion continues to put CISOs in a bind a year after a major revision
Tags: attack, breach, business, ciso, citrix, compliance, control, cyber, cyberattack, cybersecurity, data, government, incident, incident response, law, network, privacy, regulation, risk, security-incident, software, strategy, supply-chainConfusion around when and how to report cybersecurity breaches continues to plague companies a year after revised US Securities and Exchange Commission (SEC) cybersecurity breach reporting rules came into effect, experts say.As the agency that regulates and enforces federal US securities laws continues to flex its enforcement muscles against organizations that violate the strict rules,…
-
New AI Challenges Will Test CISOs & Their Teams in 2025
CISOs need to recognize the new threats AI can present, while also embracing AI-powered solutions to stay ahead of those threats. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/new-ai-challenges-test-ciso-teams-2025
-
How SASE Empowers CISOs to Combat Stress and Burnout
Tags: cisoFirst seen on scworld.com Jump to article: www.scworld.com/perspective/how-sase-empowers-cisos-to-combat-stress-and-burnout
-
4 cybersecurity trends to watch in 2025
Critical industries are up against;never before seen challenges to remain secure and operational, while regulatory pressures have completely upended the role of the CISO in corporate America. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/cybersecurity-trends-outlook-2025/736929/
-
Fortinet CISO Details ‘Phish-Free’ Phishing Scheme Using PayPal
A bad actor is using a Microsoft 365 test domain and a self-created distribution list to bypass traditional email protections and entice victims to hand over their PayPal account information in what Fortinet’s CISO is calling a “phish-free” phishing campaign. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/fortinet-ciso-details-phish-free-phishing-scheme-using-paypal/
-
GitLab CISO on proactive monitoring and metrics for DevSecOps success
In this Help Net Security interview, Josh Lemos, CISO at GitLab, talks about the shift from DevOps to DevSecOps, focusing on the complexity of building systems and integrating … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/01/09/josh-lemos-gitlab-devsecops-success/
-
High-Paying Security Career: Choosing a Path, Getting There
Know the Challenges and Opportunities of Working as a CISO, Architect or Pen Tester Cybersecurity jobs typically pay well and they can be personally rewarding because they merge advanced technical challenges with a vital mission – protecting critical systems, data and people. In this post, we’ll focus on the highest-paying jobs and the challenges and…
-
The biggest data breach fines, penalties, and settlements so far
Tags: access, apache, attack, breach, business, china, ciso, communications, compliance, control, credentials, credit-card, cyberattack, cybercrime, cybersecurity, data, data-breach, email, finance, flaw, framework, GDPR, google, hacker, Hardware, identity, Internet, law, leak, linkedin, microsoft, mobile, monitoring, network, office, phone, privacy, regulation, risk, service, software, technology, tool, training, update, vulnerabilitySizable fines assessed for data breaches in recent years suggest that regulators are getting more serious about cracking down on organizations that don’t properly protect consumer data.Hit with a $ 1.3 billion fine for unlawfully transferring personal data from the European Union to the US, Meta tops the list of recent big-ticket sanctions, with one…
-
How CISOs can forge the best relationships for cybersecurity investment
Tags: access, ai, business, ceo, cio, ciso, communications, control, cyber, cybersecurity, data, finance, framework, group, guide, metric, network, privacy, risk, risk-analysis, risk-management, threat, tool, zero-trustWhen it comes to securing cybersecurity investments there are many things at play. The key often lies in the CISO’s ability to build relationships with key stakeholders across the organization. However, CISOs are being tasked with protecting their organizations while navigating budget constraints.Although nearly two-thirds of CISOs report budget increases, funding is only up 8%…
-
AWS re:Invent 2024: The Future of Cloud, AI and Resilience
ISMG Compendium Showcases More Than 50 Interviews on Threats, Emerging Solutions. Welcome to Information Security Media Group’s AWS re:Invent 2024 Compendium featuring the latest insights from the industry’s premier cloud computing conference and the perspectives of CIOs, CISOs and other technology leaders on the future of IT and how to secure it. First seen on…
-
AWS CISO On Cybersecurity ‘Baked Into’ Chips, Security Services And Marketplace
AWS cybersecurity leader on security innovation inside Intel, AMD and Apple chips, also Nitro, EC2, services and AWS Marketplace. First seen on crn.com Jump to article: www.crn.com/news/security/2025/aws-ciso-on-cybersecurity-baked-into-chips-security-services-and-marketplace
-
What to Know About the Proposed New HIPAA Rules
If approved, the proposed new HIPAA rules will reshape the landscape of healthcare cybersecurity, partially addressing the recent OIG report’s findings on the ineffectiveness of current HIPAA audits. For CISOs, these changes present both opportunities and challenges as they work to enhance their organizations’ cybersecurity practices. The updated compliance requirements for electronic protected health information……
-
eBay CISO on managing long-term cybersecurity planning and ROI
In this Help Net Security interview, Sean Embry, CISO at eBay, discusses key aspects of cybersecurity leadership. He shares insights on balancing long-term strategic planning … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/01/07/sean-embry-ebay-enterprise-cybersecurity-planning/
-
CISOs’ Top Cybersecurity Threats 2025: Scattered Spider, Deepfakes, and More
From Scattered Spider ransomware to deepfake identities, 2025 poses critical cybersecurity challenges for CISOs. Discover strategies to protect your organization. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/01/cisos-top-cybersecurity-threats-2025-scattered-spider-deepfakes-and-more/
-
Personal liability sours 70% of CISOs on their role
Tags: breach, business, ceo, ciso, control, corporate, cybersecurity, group, insurance, jobs, ransomware, risk, technologyWith legal accountability tightening around those charged with maintaining enterprise cybersecurity, security leaders appear to be increasingly frustrated with their roles, eyeing the exit, and hesitant to pursue CISO gigs in the future. More than two thirds (70%) of CISOs recently surveyed said that “stories of CISOs being held personally liable for cybersecurity incidents has negatively…
-
12 cybersecurity resolutions for 2025
Tags: advisory, ai, api, attack, awareness, breach, business, ceo, chatgpt, china, ciso, communications, control, crowdstrike, cyber, cyberattack, cybersecurity, data, data-breach, deep-fake, defense, detection, email, identity, insurance, jobs, law, malicious, phishing, ransomware, risk, risk-assessment, risk-management, strategy, supply-chain, technology, threat, tool, training, vulnerabilityAs cyber threats continue to evolve, CISOs must prepare for an increasingly complex threat landscape. From dealing with AI-driven attacks to managing changing regulatory requirements, it’s clear that 2025 will be another big year for CISOs.But staying ahead requires more than just implementing the next cutting-edge set of tools or technologies. It demands a shift…

