Understanding the core mission of a business is essential to building effective security programs. Jon Staniforth, former CISO at Royal Mail, explains that CISOs must focus on business processes that are crucial to operations and manage compliance within that scope.
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense. Join us for a live demonstration of a new-school approach to Security Awareness Training and Simulated Phishing. Find out how 65,000+...
Serving in the public sector as CISO for the Government of Albera taught Dinel about the challenges of managing security with tight budgets. In this CyberEdBoard profile, he discussed the need to reach out to fellow defenders, share information and mentor the next generation of cyber professionals.
When Norman Kromberg looks back over his career as a security leader and IT audit specialist, understanding threats and vulnerabilities was just part of the reason for his success. A major factor was - and still is - understanding the business side of the organization.
Dom Lucas, head of security at British International Investment, reflects on how his law enforcement background shaped his approach to cybersecurity, focusing on the value of communication and continuous learning. He advises new security leaders to be open to learning from failures.
At the recent Cybersecurity Summit: Canada East, hosted by Information Security Media Group, cybersecurity leaders, industry experts and top executives discussed the surge in ransomware attacks, the integration of AI into security frameworks and growing personal liability concerns for CISOs.
With the NIS2 Directive fast approaching, cybersecurity has evolved from a technical challenge to a critical business priority. Avani Desai, CEO at Schellman, highlights the growing responsibility of boards and executives to oversee cybersecurity risk management.
Amy Herzog, chief information security officer for Ads and Devices at Amazon, shares how her cybersecurity team accelerates product development by integrating security from the start to secure customer data on popular consumer devices such as Ring and Alexa.
Matt Gordon-Smith has more than 25 years of information security experience and has led security programs. He says networking and relationship-building are critical to career success, but many aspiring CISOs face a major obstacle to interacting with other leaders: imposter syndrome.
Shervin Evans began his career as a programmer but he always knew his future was in cybersecurity. Now, 25 years later as an information security officer, he evangelizes about cybersecurity to employees in his organization, his family and the broader community.
Understanding business goals is key to aligning cybersecurity strategies, said Erik Hart, CISO at commercial real estate services firm Cushman & Wakefield. Hart stressed the importance of security leaders becoming solution finders who integrate cybersecurity with business operations.
As cloud computing, DevOps and automation continue to evolve, the lines between IT functions are fading, making security integral to these processes. Hiren Dave, CIO and CISO at Essen Health Care, shares how combining the roles of CIO and CISO improves risk management and communication.
The STAR - Situation, Task, Action, Result - method is a widely used framework for answering behavioral interview questions. It allows job candidates to present their experiences in a structured way, making it easier for interviewers to understand their problem-solving skills and real-world impact.
The healthcare sector is plagued by increasingly complex cyberthreats, and simply meeting compliance standards is not doing enough to protect sensitive healthcare data, according to Christopher Frenz, assistant vice president of IT security at Mount Sinai South Nassau.
John F. Banghart has spent 30 years in cybersecurity, and he appreciates the importance of creative thinking, upskilling and collaboration. Looking back on the Heartbleed vulnerability, Banghart said the incident demonstrates the need to address software supply chain risks causing problems today.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.