May 29, 2015
News roundup: Cybersecurity is finally garnering attention at the boardroom table, but not necessarily for the right reasons. Plus: Ponemon's "Cost of Data Breach"; D-Link vulnerabilities; NitlovePOS; bad bots.
April 23, 2015
Experts at a Verizon event at RSA Conference 2015 say no data breach response plan is complete until certain human factors are considered.
August 08, 2014
At Black Hat 2014, Yahoo CISO Alex Stamos decried enterprise security companies' inability to handle scale and system diversity, and called on vendors to seize the opportunity for innovation.
July 17, 2014
New Ponemon Institute data shows enterprise executives rarely if ever talk with their security teams, and that threat modeling may be underused.
CISO Get Started
Bring yourself up to speed with our introductory content
Renee Guttmann, vice president of the Office of the CISO at Accuvant, talks to SearchSecurity about security leadership, and offers advice to today's aspiring CISOs. Continue Reading
An IT security governance board is a key feature in security budgeting, but who makes up this body? Expert Joseph Granneman outlines the best structure for security governance boards. Continue Reading
In these days of a breach a minute, a strong information security program is a competitive differentiator. Here's how CIOs and CISOs prove it. Continue Reading
Evaluate CISO Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Chief information risk officers seem to be on the horizon as CISOs become inundated with responsibilities, but adding another c-level could cause more harm than good. Continue Reading
In this podcast, Dan Bowden, CISO at University of Utah Healthcare, says mobile health security is a top concern and risk assessment is paramount. Continue Reading
The executive turnover at enterprises after a data breach is fairly high. Expert Mike Villegas gives some advice on how CISOs can avoid losing their job. Continue Reading
Learn to apply best practices and optimize your operations.
Compliance officers have typically equipped themselves with spreadsheets to track compliance and manage audits, but the scope and complexity of today's regulatory environment stretch traditional methods to its limits. More organizations are turning to GRC software tools to help automate compliance assessment tasks from data collection to gap analysis. But while such tools have the potential to cut costs and create smoother compliance workflows, they can be challenging to implement.
In this SearchCompliance handbook, we'll examine how compliance officers and IT managers can deploy automated GRC strategies that support the organization's data governance objectives. Topics discussed include:
Integrating GRC software with enterprise applications Storing GRC data in the cloud Ensuring the GRC tool responds to the demands of big data Realizing the MDM benefits of automated GRCContinue Reading
CISOs should take on the responsibility of encouraging interdepartmental cooperation between the security team and IT operations. Here are five ways to accomplish this lofty task. Continue Reading
The career is only now defining itself. Continue Reading
Problem Solve CISO Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
CISOs sometimes need to work a bit harder to gain the same respect given to other C-level positions, but there are ways for CISOs to gain more respect. Continue Reading
CISO roles and responsibilities are built on impossible standards and unrealistic expecations. Expert Joseph Granneman explains this trend and why enterprises need to reverse it. Continue Reading
Video: Securicon's Ernie Hayden discusses why new resources make the CISO role easier, but new threats and a brighter spotlight make the role harder than ever. Continue Reading