Why CISOs and CIOs Should Work Together More Closely

Why CISOs and CIOs Should Work Together More Closely

Although there are overlaps in the goals and responsibilities of the CIO and the CISO, there are also challenges that get in the way of a more cohesive relationship, including reporting lines, organizational structures, budgets, and risk appetites. If they don’t overcome these challenges, they’ll stall the technology from achieving its full potential, silos will persist, and the rifts will widen. What’s the aim? Unite these two executive leaders under a common purpose. A panel…

Read More

Australian CEOs Struggling to Face Cyber Risk Realities

Australian CEOs Struggling to Face Cyber Risk Realities

Image: ImageFlow/Adobe Stock Fear and the more technical aspects of cybersecurity are still stopping Australian CEOs from engaging more deeply with cybersecurity risks, despite a string of high-profile cyberattacks that have hit Australian brands, including Optus and Medibank and millions of their customers. New research from consulting firm Accenture found that only one in five (19%) of Australian CEOs are currently dedicating board meetings to discussing cybersecurity issues, while 34% think cybersecurity isn’t a strategic…

Read More

CISO perspective on breach disclosure 1 year after Sullivan conviction

CISO perspective on breach disclosure 1 year after Sullivan conviction

CISO perspective on breach disclosure 1 year after Sullivan conviction | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

FBI cyber veteran Don Good named Everest CISO

FBI cyber veteran Don Good named Everest CISO

FBI cyber veteran Don Good named Everest CISO | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

What CISOs need to know to mitigate quantum computing risks

What CISOs need to know to mitigate quantum computing risks

What CISOs need to know to mitigate quantum computing risks | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Earning the “C” in CISO: Staying secure through economic turbulence

Earning the “C” in CISO: Staying secure through economic turbulence

Earning the “C” in CISO: Staying secure through economic turbulence | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

A generative AI guidebook was released for CISOs

A generative AI guidebook was released for CISOs

A generative AI guidebook was released for CISOs | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Sixty-three percent of CISOs predict hybrid or remote work to remain

Sixty-three percent of CISOs predict hybrid or remote work to remain

63% of CISOs predict hybrid or remote work to remain for years | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

As data privacy gets stricter, is zero trust the answer?

As data privacy gets stricter, is zero trust the answer?

As data privacy gets stricter, is zero trust the answer? | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

How CISOs and CFOs can collaborate to combat cyber threats

How CISOs and CFOs can collaborate to combat cyber threats

How CISOs and CFOs can collaborate to combat cyber threats | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 2 3 4