Leadership lessons at the movies

Leadership lessons at the movies

In 2011, Dave Logan, John King and Halee Fischer-Wright introduced “tribal leadership,” in which members of an organization cluster together based on shared beliefs and outlooks. So while the security, marketing and operations departments may have their unique cultures, employees will naturally gravitate toward like-minded people beyond their division. Each tribe — which may contain 20 to 150 people — occupies a specific stage, according to this theory. Stage 1 tribes believe “Life sucks, and…

Read More

Leading by example

Leading by example

Building a robust security culture is central creating a successful security strategy within any organization. Here, I had the opportunity to discuss with two industry leaders — Kirsten Provence, Executive Director Security Programs & Governance at Kaiser Permanente, and Kristine Raad, Chief Security Officer at General Motors, their approaches to security and creating a positive culture from the top down. “It really doesn’t matter what industry you’re in, security is everyone’s responsibility. However, you can’t…

Read More

Starting a job in tech? Read this advice to maximize your experience

Starting a job in tech? Read this advice to maximize your experience

It’s that time of the year. New graduates have just begun to enter the workforce, re-fueling a cybersecurity industry that desperately needs talent around the world. Right now, the shortage sits at just under four million unfilled cybersecurity jobs globally, with the gap rising year-over-year, according to the nonprofit ISC2.  It is imperative that the industry do all it can to retain new graduates who are entering the industry, but there are steps that grads…

Read More

How organizations can save CISOs amidst increasing federal regulations

How organizations can save CISOs amidst increasing federal regulations

In an effort to bolster data security and privacy practices amidst increasing cyberattacks, new data breach reporting rules enforced by the Federal Trade Commission (FTC) and Securities and Exchange Commission (SEC) have taken effect for various organizations and financial institutions. Since May 13, 2024, non-banking financial institutions (including mortgage brokers, payday lenders and tax preparation firms) must report data breaches to the FTC within 30 days of discovery. This new mandate, which is part of…

Read More

Empowering remote healthcare workers: A collaborative approach

Empowering remote healthcare workers: A collaborative approach

Healthcare organizations are increasingly adopting remote work as a permanent strategy. In this new era, robust cybersecurity is critical. This article delves into strategies healthcare organizations can implement to empower their remote workforce and protect sensitive patient and corporate data. Understanding shared security responsibility With remote employees now relying on IT resources beyond the control of healthcare organizations, the concept of shared security responsibility becomes paramount. It’s not just about organizations securing as much of…

Read More

Top 5 things CISOs should know to protect their business

Top 5 things CISOs should know to protect their business

For businesses of every size and level of maturity, a strong cybersecurity strategy is crucial to protecting sensitive data and other digital assets. The right security measures are key to building resilience against increasingly sophisticated cyber threats in an interconnected world but must also be optimized for a company’s business. There is no one best practice that is applicable to every company. The focus on cybersecurity will continue to sharpen, and companies will rely more…

Read More

Breaking down DE&I barriers: Practical tips for security leaders

Breaking down DE&I barriers: Practical tips for security leaders

March is Women’s History Month — an important time to acknowledge the women who are paving the way for innovation within organizations across all industries, specifically within science, technology engineering and math (STEM) fields such as cybersecurity, computer sciences and beyond. The crossroads of diversity, equity and inclusion (DE&I) and cybersecurity is a powerful reminder that diversity is at the heart of innovation. The more varied the experiences and thinking of employees, the better the…

Read More

Finding your volunteer leadership lane

Finding your volunteer leadership lane

Finding your volunteer leadership lane | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Sailing the seven (or more) Cs of leadership

Sailing the seven (or more) Cs of leadership

Sailing the seven (or more) Cs of leadership | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Why ethical corporate conduct is integral to competitive edge

Why ethical corporate conduct is integral to competitive edge

Why ethical corporate conduct is integral to competitive edge | 2021-08-02 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More