The modern CISO: Mounting pressure, systemic risk and growing boardroom influence

The modern CISO: Mounting pressure, systemic risk and growing boardroom influence

The modern CISO: Mounting pressure, systemic risk and growing boardroom influence This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The dos and don’ts of advocating for cybersecurity in the boardroom

The dos and don’ts of advocating for cybersecurity in the boardroom

The dos and don’ts of advocating for cybersecurity in the boardroom This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The Cybersecurity and Geopolitical Podcast— Morality and Cyber Risk, Role of a CISO, and Governmental Anti-Cybercrime — Episode 7

The Cybersecurity and Geopolitical Podcast— Morality and Cyber Risk, Role of a CISO, and Governmental Anti-Cybercrime — Episode 7

The Cybersecurity and Geopolitical Podcast— Morality and Cyber Risk, Role of a CISO, and Governmental Anti-Cybercrime — Episode 7 This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More

The critical role of a CISO means advocating for cybersecurity

The critical role of a CISO means advocating for cybersecurity

The critical role of a CISO means advocating for cybersecurity This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Joe Silva named CISO at JLL

Joe Silva named CISO at JLL

Joe Silva named CISO at JLL This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing this message…

Read More

Marc Packler named President, CISO Advisory at Silent Quadrant

Marc Packler named President, CISO Advisory at Silent Quadrant

Marc Packler named President, CISO Advisory at Silent Quadrant This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Peter Hoff named VP of Cyber Security and Risk at Wursta

Peter Hoff named VP of Cyber Security and Risk at Wursta

Peter Hoff named VP of Cyber Security and Risk at Wursta This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

How to apply Sun Tzu’s ‘The Art of War’ to cybersecurity

How to apply Sun Tzu’s ‘The Art of War’ to cybersecurity

How to apply Sun Tzu’s ‘The Art of War’ to cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

The engagement effect: A CISO’s guide to securing hybrid workplace networks

The engagement effect: A CISO’s guide to securing hybrid workplace networks

The engagement effect: A CISO’s guide to securing hybrid workplace networks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Where to spend on security depends on business objectives

Where to spend on security depends on business objectives

Where to spend on security depends on business objectives | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 14 15 16 17 18 19