The person in charge of your cybersecurity program is often called the Chief Information Security Officer, or CISO. About the CISO Title, and Why It Matters The CISO title is…
Let’s review the typical functions of a cybersecurity program. These functions are often performed by separate teams in very large organizations or by a single team in smaller ones. Some…
Becoming a low-profile target by practicing great cyber hygiene is one of the four major goals of a Cyber Risk Management Program. The other three are: Achieving your customers’ expectations…
Did you know that leaning into your cyber risks can be a source of competitive advantage? Here’s a stunning data point that makes my case. This year, the NTT Group (Japanese AT&T) released…
Being compliant with applicable laws and regulations is one of the four major goals of a Cyber Risk Management Program. The other three are: Achieving your customers’ expectations (covered two…
Being resilient to cyber-attacks and cyber failures is one of the four major goals of a Cyber Risk Management Program. The other three are: Achieving your customers’ expectations (covered last…
Achieving your customers’ expectations is one of the four major goals of your cyber risk management program. The other three are: Being resilient to cyber-attacks and cyber failures Being compliant…
Last Thursday, I sat down with Ray Pompon (F5) and Michael Hamilton (Critical Informatics) to discuss a recent report on “The Evolving Role of CISOs”. Among many things, we covered:…
Everyone, you are invited to join us this Thursday, November 16th at 10am Pacific Time, for a great webinar on “The Evolving Role of CISOs and Their Importance to the…
Last week, while I was presenting two sessions at SecureWorld in Seattle (including “Equifax and The ‘Reasonable’ Cybersecurity Standard“), I talked with Chuck Harold, of Security Guy Radio, about how we…