AI security for CISOs: A dynamic and practical framework

AI security for CISOs: A dynamic and practical framework

Few technologies have infiltrated the business world as rapidly — and with so much enthusiasm from leaders — as artificial intelligence (AI) and machine learning (ML). By some reports, two-thirds of enterprises are already using generative AI, citing benefits like productivity gains and improved customer relationship management.  But with the excitement for AI and ML comes security and privacy concerns. Leaders consistently point to security as a top concern when adopting generative AI. Even CISOs,…

Read More

4 practices CISOs should prioritize in their mobile security strategy

4 practices CISOs should prioritize in their mobile security strategy

In an era where cyber threats are evolving at an alarming pace, the role of a Chief Information Security Officer (CISO) has never been more critical. Today, CISOs are the guardians of an organization’s digital assets, and in this role, they face a very daunting task — they’re being called to protect sensitive data, maintain customer trust and ensure business continuity without introducing friction. In the case of banks and financial institutions, this trove of…

Read More

3 tips to help bridge the gap between identity and security teams

3 tips to help bridge the gap between identity and security teams

Every year, we see the lines continue to blur between IT, operations and security teams, with many functions traditionally sitting with the CIO that may be better suited with the CISO — or at least need a dotted line to the security team. One such function is identity. Identity and Access Management traditionally manages access to systems, databases, devices, the cloud, SASS applications, remote access, multi-factor authentication (MFA) and account privileges rather than focusing on…

Read More

5 commitments CISOs can make to boost cyber resilience

5 commitments CISOs can make to boost cyber resilience

CISOs have always had a very tough job, but with spikes in virtually every kind of attack, new AI-related risks and a shifting regulatory environment, keeping businesses safe and compliant is only getting more difficult. While there is no way to anticipate every new threat, there are some data-backed ways to limit risk and build lasting resilience against attacks. Here are five key commitments that CISOs should consider making this year to improve their cybersecurity…

Read More

Lester Godsey | Top Cybersecurity Leaders 2024

Lester Godsey | Top Cybersecurity Leaders 2024

Over the past three decades, Lester Godsey has dedicated himself to serving his communities through his roles in public sector cybersecurity. Godsey took his first cybersecurity job as a Support Center Analyst in the College of Engineering and Applied Sciences at his alma mater, Arizona State University (ASU), while he was an undergraduate studying music. While he initially considered becoming a band teacher, he soon discovered his interest in system administration and cybersecurity, which eventually…

Read More

How to build cyber resilience in a rapidly evolving threat landscape

How to build cyber resilience in a rapidly evolving threat landscape

The ransomware landscape is ever evolving and it can seem as though there is a new headline about a breach, extortion demand or fallout after an attack every day. But how can security leaders build cyber resilience?  Here, we talk to Justin Shattuck, Chief Information Security Officer (CISO) at Resilience Security magazine: Tell us about your title and background.  Shattuck: I currently serve as the CISO for Resilience, a cyber risk company bridging the divide between…

Read More

CISO perspective on breach disclosure 1 year after Sullivan conviction

CISO perspective on breach disclosure 1 year after Sullivan conviction

CISO perspective on breach disclosure 1 year after Sullivan conviction | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Collaboration between the CISO and other business leaders is critical

Collaboration between the CISO and other business leaders is critical

Collaboration between the CISO and other business leaders is critical | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

FBI cyber veteran Don Good named Everest CISO

FBI cyber veteran Don Good named Everest CISO

FBI cyber veteran Don Good named Everest CISO | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

The importance of security hygiene

The importance of security hygiene

The importance of security hygiene | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More
1 2 3