Category Archives: CSO and CISO, IT Leadership, Security Practices

Auto Added by WPeMatico

AI could provide the cyber-risk crystal ball every CISO needs

As much as cybersecurity professionals might prefer otherwise, ours is a field defined by reaction — just ask the average cyber analyst or threat hunter about their day to get a sense of how true this is. We are a technology-centric field in a functional sense, but technology evolves interactively alongside trends in economics, sociopolitical […]

Immediate threats or long-term security? Deciding where to focus is the modern CISO’s dilemma

Cybersecurity has become a high-stakes balancing act — the modern CISO is under constant pressure to protect their organization from the latest threats, including ransomware and phishing, while also developing long-term security strategies and reporting to the C-suite and board. This means juggling immediate needs, such as patching vulnerabilities and responding to cyber incidents, with long-term […]

Want to get ahead? Four activities that can enable a more proactive security regime

Hockey legend Wayne Gretzky famously shared his secret to success on the ice: “I skate to where the puck is going to be, not where it has been.” Security teams would do well to embrace Gretzky’s forward-looking strategy in their own work; those who place emphasis on where their security program needs to get to […]

Cybersecurity should return to reality and ditch the hype

As a chief information security officer (CISO), I’ve witnessed firsthand the transformation of cybersecurity from a niche IT function to a boardroom priority. Yet, despite its rise in prominence, this field is flooded with voices that often lack the depth and precision essential for true cybersecurity practice. At its core, cybersecurity is about safeguarding information […]

Cybersecurity should return to reality and ditch the hype

As a chief information security officer (CISO), I’ve witnessed firsthand the transformation of cybersecurity from a niche IT function to a boardroom priority. Yet, despite its rise in prominence, this field is flooded with voices that often lack the depth and precision essential for true cybersecurity practice. At its core, cybersecurity is about safeguarding information […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies.