Configuration management

CISO News

View All News

CISO Get Started

Bring yourself up to speed with our introductory content

  • What CISOs need to incorporate into cloud service-level agreements

    CISOs may be unfamiliar with cloud service-level agreements, but they're still a necessary part of enterprise security. Expert Mike O. Villegas has some tips to build cloud SLAs. Continue Reading

  • DevOps and security? Here's how

    The automation of development and operations processes, known as DevOps, is catching on in project teams and business units across industries. The missing component in many of these high-risk scenarios? Security. To make DevOps and security work together, CISOs need to have ongoing collaboration with developers, automating security checks early in the process and providing them with visibility and feedback. In this issue, early adopters of the DevOps and security model share tips on how to defend the cloud's continuous improvement model.

    Retailers, led by Wal-Mart Stores, Home Depot and the National Retail Federation, contend that the two-factor authentication provided by chip and PIN card technology offers the highest level of security. Financial institutions, led by Visa, MasterCard and the American Bankers Association, say it's the microchip embedded in the card that matters because it combats counterfeit fraud. We look at both sides of the chip and PIN card debate.

    The consequences of a company's failure to stay apprised of data protection laws and to implement best practices can be dire. Organizations may find themselves not only targets of post-breach lawsuits, but on the receiving end of the Federal Trade Commission's scrutiny. By pooling the collective knowledge of the legal and IT security organizations, and by staying on top of requirements and updating them as appropriate, CISOs can cover all of their bases in a comprehensive way. We tell you how to set up the swim lanes of a legal partnership.

     Continue Reading

  • CISO challenges: Addressing cybersecurity blind spots

    Every enterprise has cybersecurity blind spots that it fails to recognize and address. Sean Martin explains what they are and how they create more CISO challenges. Continue Reading

View All Get Started

Evaluate CISO Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage CISO

Learn to apply best practices and optimize your operations.

  • High-stakes role of CISO: Scott Howitt, MGM Resorts International

    Many organizations are making the CISO a peer to the CIO or taking the position out of IT altogether, says Howitt, who has held several technology and leadership positions. Continue Reading

  • Dedicated CISO job still open to debate

    Almost 20 years after Citicorp decided to hire an executive-level security position dedicated to protecting its banking business, the responsibilities of the CISO job are still unclear to many business executives and open to discussion. Why do some companies still need convincing?

    As threats and infrastructure evolve at a fast pace, chief information security officers have to remain proactive in the face of ongoing digitization and globalization. In this issue of Information Security magazine, we look at the role's elevation and influence on broader security and risk management initiatives. Most importantly, we highlight accomplishments of dedicated chief security officers from different industries -- entertainment, financial services, healthcare, retail and technology -- and get their views on challenges in the CISO job and changes ahead.

    "The CISO has evolved from a technical security role to that of a corporate executive with a risk management focus," says Tim Callahan, senior vice president of global security and CISO at Aflac.

    Strategic security is an increasing responsibility of the CISO job. A growing number of security officers have implemented a threat intelligence capability to help steer the technical aspects of their security program. We talk to CISOs and other security experts about some lessons they've learned -- sometimes the hard way -- as they lead these efforts. The CISO job is tough, but those who are up to the challenge find great rewards.

     Continue Reading

  • Changes in CISO responsibilities call for new reporting structure

    CISO responsibilities are both expanding and shifting to other departments. CEB's Jeremy Bergsman sorts out the future state of IS, privacy and the risk ecosystem. Continue Reading

View All Manage

Problem Solve CISO Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close