Tag: ciso
-
Inside the Relentless Liability Pressures Facing CISOs
SolarWinds CISO Tim Brown’s Case Shows Personal, Legal and Health Risks for CISOs. CISOs face tremendous stress in dealing with regulatory scrutiny and legal exposure in the wake of a data breach. SolarWinds CISO Tim Brown shares the personal and professional impact of Securities and Exchange Commission charges against him after the 2020 SolarWinds supply…
-
Why NHIs Leave Security Experts Satisfied
Tags: cisoWhy is Satisfaction with NHIs Paramount in Security Expertise? When it comes to managing security, Non-Human Identities (NHIs) have become a critical focus for many CISOs and security professionals. This growing importance prompts the question: Why does satisfaction with NHIs play a significant role in demonstrating security expertise? Why NHIs are Essential for Security Management……
-
AI Narrows the Cyber Gap Between Attackers and Defenders
NightDragon CEO Dave DeWalt Sees Cautious Optimism With Agentic AI. Advances in scalable AI and agentic technologies are creating a long-awaited shift in the defender-offender dynamic. With autonomy and agentic capabilities entering production, CISOs may soon deploy 100,000 autonomous agents instead of hiring more staff, said Dave DeWalt, CEO of NightDragon. First seen on govinfosecurity.com…
-
Prepare to Start Implementing Quantum-Safe Algorithms
ISC2 CISO Jon France on Why Quantum Resilience Falls Squarely Under the CISO. Quantum computing is at a tipping point, moving from theoretical math to deployable physics, said Jon France, CISO at ISC2. So, security teams need to start addressing the implementation of quantum-safe algorithms now, beginning with the five new safe algorithms released by…
-
AI Bots Take Over Cybersecurity at HDFC Bank
HDFC Bank’s Sameer Ratolikar on the Automation Shift in Security. HDFC Bank’s CISO Sameer Ratolikar shares the bank’s vision of becoming an AI-first institution, emphasizing architectural simplicity, agentic AI for threat detection and balancing automation with human expertise to enhance cybersecurity and customer experience. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ai-bots-take-over-cybersecurity-at-hdfc-bank-a-28241
-
Rethinking Cybersecurity With AI Agents
Anthropic’s Jason Clinton Discusses the Benefits and Challenges of AI Agents. AI agents will be crucial in the software development life cycle to eliminate bugs, improving the quality of software, which could significantly reduce security vulnerabilities. Although managing AI agents for identity and access controls will be hard, said Jason Clinton, CISO at Anthropic. First…
-
Why CISOs Are Adopting DevSecOps for Secure Software Development
CISOs adopting DevSecOps strategically enhance security measures while ensuring fast-paced software development, responding to the growing landscape of cyber threats. Integrating security practices throughout the entire development lifecycle is critical for organizations seeking to reduce vulnerabilities without sacrificing innovation speed. The DevSecOps Imperative DevSecOps builds upon the DevOps foundation by embedding security practices directly into…
-
Microsoft ernennt Deputy-CISO für Europa
Microsoft ernennt einen Deputy-CISO für Europa.Die immer lauter werdenden Rufe nach einer digitalen Souveränität Europas angesichts des erratisch agierenden Mannes im Weißen Haus lassen Microsoft um seine Geschäfte bangen. Der jüngste Coup nach der Ankündigung eines Investitionsprogramms in EU-Rechenzentren, frei von US-Zugriffen: Für Europa wird ein Deputy-CISO im Rahmen des Microsoft Cybersecurity Governance Council ernannt.Die…
-
Neurohacks to outsmart stress and make better cybersecurity decisions
Think like a hacker: For neuroscientist, business professor at Columbia University, and former hacker Moran Cerf, the link between cybersecurity and neuroscience is instinctive. He points out that working in cybersecurity, particularly as a hacker, is often about understanding how people think and then spotting the gaps.That same shift in understanding, tuning into how the…
-
The Myth of the Perfect CISO: A Multitalented Master of All
Ellis of YL Ventures on How Modern CISOs Must Lead, Not Master Every Discipline. There were never many ‘do everything’ CISOs. Today there are even fewer. But with a specialist area, strong overview and ability to channel expertise, CISOs can align with business goals, embrace the business enabler role, demonstrate quick wins, and ensure their…
-
Application Security in 2025 CISO’s Priority Guide
Application security in 2025 has become a defining concern for every Chief Information Security Officer (CISO) as organizations accelerate their digital transformation journeys. The explosion of cloud-native applications, microservices, and APIs has created a complex web of interconnected systems. This complexity, while enabling rapid innovation, has also expanded the attack surface, making applications prime targets…
-
Preparing for Quantum Cybersecurity Risks CISO Insights
Quantum cybersecurity risks represent a paradigm shift in cybersecurity, demanding immediate attention from Chief Information Security Officers worldwide. While practical quantum computers capable of breaking current encryption standards may still be years away, the threat is already present through >>harvest now, decrypt later
-
Securing Digital Transformation CISO’s Resource Hub
In today’s hyper-connected world, securing digital transformation is a technological upgrade and a fundamental reimagining of business models, processes, and customer engagement. Organizations are rapidly shifting to cloud platforms, embracing automation, and integrating digital tools to remain competitive and resilient. However, this evolution brings a new spectrum of security challenges, expanding the attack surface and…
-
Building a Scalable Cybersecurity Framework CISO Blueprint
Building a scalable cybersecurity framework is essential in today’s rapidly evolving digital landscape, enabling organizations to adapt to changing threats while supporting business growth. A scalable cybersecurity framework isn’t merely about adding more security controls as an organization expands. It’s about creating a flexible structure that can evolve with the business, anticipate future challenges, and…
-
Protecting Intellectual Property CISO’s Resource Guide
In today’s digital-first business environment, protecting intellectual property is crucial, as IP remains one of an organization’s most valuable assets. From proprietary algorithms and software code to confidential business strategies and customer data, these digital assets form the competitive backbone of modern enterprises. For Chief Information Security Officers (CISOs), developing comprehensive strategies to safeguard these…
-
Behavioral Analytics for Threat Detection CISO Trends
In today’s evolving cybersecurity landscape, CISOs face unprecedented challenges from sophisticated threats, making behavioral analytics for threat detection a critical defense strategy. Traditional security measures like firewalls and antivirus solutions are no longer sufficient against advanced attacks that easily bypass perimeter defenses. Behavioral analytics has emerged as a critical strategy, offering proactive threat detection by…
-
Navigating Healthcare Cybersecurity CISO’s Practical Guide
Navigating healthcare cybersecurity is crucial in today’s hyper-connected environment, where it underpins both operational resilience and patient trust. The rapid digitization of medical records, proliferation of connected devices, and the growing sophistication of cyber threats have placed Chief Information Security Officers (CISOs) at the forefront of organizational strategy. No longer just gatekeepers of compliance, CISOs…
-
Preparing for Cyber Warfare CISO’s Defense Resource Guide
In the digital age, preparing for cyber warfare is essential as organizations face unprecedented threats beyond traditional hacking and data breaches. Cyber warfare-where attacks are orchestrated by nation-states or highly organized groups-can cripple critical infrastructure, disrupt business operations, and erode trust in institutions. As these threats become more sophisticated and persistent, the Chief Information Security…
-
Quantum Computing and Cybersecurity What CISOs Need to Know Now
As quantum computing transitions from theoretical research to practical application, Chief Information Security Officers (CISOs) face an unprecedented challenge to cryptographic security. The emergence of cryptanalytically relevant quantum computers (CRQCs) threatens to break widely-used public-key encryption algorithms that safeguard sensitive data and communications. This looming crisis, often referred to as >>Y2Q>Q-Day,
-
The 14 most valuable cybersecurity certifications
Tags: access, ai, application-security, attack, automation, best-practice, blockchain, blueteam, china, cisa, cisco, ciso, cloud, compliance, computer, computing, conference, control, country, credentials, cryptography, cyber, cybersecurity, data, defense, encryption, endpoint, exploit, finance, governance, government, guide, hacker, hacking, incident response, intelligence, Internet, jobs, kali, law, linux, malware, metric, microsoft, monitoring, network, penetration-testing, privacy, reverse-engineering, risk, risk-analysis, risk-management, skills, threat, training, vulnerability, windowsIndustry recognition Who’s to say one certification is more respected than another? Such criteria can be very subjective, so we turned to the most direct and unbiased source to cut through the ambiguity: job listings. In addition to education, skills, and qualifications, employers often specify certs they seek in their ideal candidate. These mentions carry…
-
ISMG Editors: Day 3 Highlights From RSAC Conference 2025
Panel Explores AI Innovation, Geopolitical Tensions and Cybersecurity Leadership. ISMG editors share insights from Day 3 of RSAC Conference 2025, unpacking nagging AI security challenges, evolving CISO roles, operational technology protection and the impact of geopolitical tensions on global cybersecurity collaboration. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ismg-editors-day-3-highlights-from-rsac-conference-2025-a-28173
-
The Expanding Role of CISOs in Tech and Corporate Governance
Team8’s Liran Grinberg on How CISOs Influence Boardrooms and Enterprise Security. With cyber risk ranked as one of the top threats to business continuity, cybersecurity has now become a core component to business survival. Liran Grinberg, co-founder and managing partner at Team8, said the CISO’s role has transformed into one of the most critical positions…
-
Current SaaS delivery model a risk management nightmare, says CISO
JPMorgan Chase security chief Patrick Opet laments the state of SaaS security in an open letter to the industry and calls on software providers to do more to enhance resilience First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366623300/Current-SaaS-delivery-model-a-risk-management-nightmare-says-CISO
-
How CISOs Can Strengthen Supply Chain Security in 2025
The responsibilities of Chief Information Security Officers (CISOs) are rapidly evolving as digital transformation and global interconnectivity reshape the modern supply chain. In 2025, the supply chain will be more than just a logistical function; it will be a complex, dynamic web of partners, vendors, and technologies, each introducing new vulnerabilities and attack vectors. High-profile…
-
The CISO’s Guide to Effective Cloud Security Strategies
As organizations accelerate cloud adoption, CISOs face unprecedented challenges securing dynamic, multi-cloud environments. The shift to cloud-native architectures, hybrid workloads, and decentralized data storage has expanded the attack surface, exposing enterprises to sophisticated threats like supply chain compromises, misconfigured APIs, and insider risks. With 70% of breaches now linked to cloud assets, CISOs must balance…

