Security's Top Cybersecurity Leaders 2024

Security's Top Cybersecurity Leaders 2024

Security magazine presents the honorees of our fourth annual Top Cybersecurity Leaders program, which recognizes enterprise information security executives and professionals and their industry accomplishments. This year’s nominees represent the wide range of cybersecurity professionals making a difference across the field and in their organizations. Our 2024 awardees lead by example and improve security through innovative approaches to risk and technology. The goal of the Top Cybersecurity Leaders program is to spotlight cybersecurity professionals who…

Read More

The state of the chief information security officer role

The state of the chief information security officer role

The growing importance of cybersecurity has led to an expansion in security leadership roles. According to an IANS report, most fortune firm chief information security officers (CISOs) are VP-level or higher. The report found that 74% of CISOs and global CISOs report to a CIO or CTO. The other 26% report to a business function such as a COO, CFO, chief risk officer or legal counsel. According to the report, four in 10 CISOs spend…

Read More

Navigating CISOs' top 4 challenges

Navigating CISOs' top 4 challenges

What keeps a chief information security officer (CISO) up at night? We are asked this question frequently, and the answer is complex. The field of cybersecurity is dynamic, with conflicting, high-stakes priorities and never-ending time-sensitive tasks. Working diligently to protect their organizations, CISOs face a variety of challenges without simple answers, and the steps to address them are often nebulous, time-consuming and resource-intensive. Let’s take a closer look at what is top of mind for…

Read More

Making SASE and zero trust work for the enterprise

Making SASE and zero trust work for the enterprise

Making SASE and zero trust work for the enterprise | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Collaboration between the CISO and other business leaders is critical

Collaboration between the CISO and other business leaders is critical

Collaboration between the CISO and other business leaders is critical | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Embracing a company culture of cybersecurity starts at the top

Embracing a company culture of cybersecurity starts at the top

Embracing a company culture of cybersecurity starts at the top | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

AMA: CISO Edition — Diego Souza

AMA: CISO Edition — Diego Souza

AMA: CISO Edition — Diego Souza | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Nominate your peers for 2023 Most Influential People in Security award

Nominate your peers for 2023 Most Influential People in Security award

Nominate your peers for 2023 Most Influential People in Security award | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Reflections on 35 years in the trenches

Reflections on 35 years in the trenches

Reflections on 35 years in the trenches | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Security’s 2023 Top Cybersecurity Leaders

Security’s 2023 Top Cybersecurity Leaders

Security’s 2023 Top Cybersecurity Leaders | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More
1 2 3 19