HackDig : Dig high-quality web security articles for hackers

Effective Data Security Begins With a Strong Tech Foundation

Data is the engine of the modern economy. Whether it consists of customer data, intellectual property, market insights or financial information, these types of sensitive data enable the most successful businesses to thrive. It’s no surprise, then, that securing that critical data is increasingly a strategic priority for organizations around the globe.
Publish At:2020-03-31 08:26 | Read:324 | Comments:0 | Tags:CISO Data Protection Chief Information Officer (CIO) Chief I

What Can We Learn From the ‘Global State of Information Security Survey 2018’?

In October 2018, PricewaterhouseCoopers (PwC) released the latest edition of “The Global State of Information Security Survey.” For this report, the professional services firm surveyed over 9,000 leaders, including CEOs, chief financial officers (CFOs), chief information officer (CIOs) and chief information security officers (CISOs), from 122 cou
Publish At:2017-11-02 13:10 | Read:4992 | Comments:0 | Tags:Risk Management Chief Information Officer (CIO) Chief Inform

Increased Awareness Is the Best Cure for Health Care Security Risks

The health care market is quite heterogeneous, and as a result, each organization has a unique set of cybsersecurity needs and characteristics. The industry includes hospitals of all sizes, local doctoral consortia, public health care institutions and individual physicians. Naturally, health care security risks vary depending on the size and type of organiza
Publish At:2017-09-15 15:35 | Read:3630 | Comments:0 | Tags:Data Protection Health Care Risk Management Chief Informatio

Cybersecurity Leadership in Transition: A View From the Classroom

As an introduction to the topic of cybersecurity leadership in transition, indulge in a quick story: A CEO tells of the time he discovered that the employees in the shipping department were putting a blank sheet of paper in every box, just before it was sealed up and sent off to customers. Their only explanation was, “We don’t really know why;
Publish At:2017-05-08 22:00 | Read:4198 | Comments:0 | Tags:CISO Academia Chief Information Officer (CIO) Chief Informat

Building an Effective CISO-CIO Partnership

For many, the most common reporting structure in today’s business environment is overly complicated. The majority of security leaders around the world report directly to the chief information officer (CIO), which can cause an enormous amount of conflict. That reporting structure, however, is slowly changing for some companies. In those organizations,
Publish At:2017-04-27 01:10 | Read:4027 | Comments:0 | Tags:CISO Government C-Suite Chief Information Officer (CIO) Chie

How to Hire Your Next CISO

One of the most critical hires of any IT-related job is usually the chief information security officer (CISO) or chief information officer (CIO). But the decision to hire these executives is one CEOs and boards of directors typically do not want to make. This decision is often made during a crisis of some kind. It could result from a knee-jerk reaction to a
Publish At:2017-04-20 21:55 | Read:3649 | Comments:0 | Tags:CISO Chief Executive Officer (CEO) Chief Information Officer

Is the CISO Reporting Structure Outdated?

Security has become a top concern for enterprises, so it’s no wonder that the chief information security officer (CISO) reporting structure has changed. The position has risen in the organizational structure to the inner echelon of the C-suite, giving the CISO top-level visibility within the business. That doesn’t guarantee autonomy, however. The
Publish At:2017-01-20 01:20 | Read:4289 | Comments:0 | Tags:CISO C-Suite Chief Information Officer (CIO) Chief Informati

The Most Unnerving Security Trends to Prepare for in 2017

Security has become a top line item of discussion in enterprises around the globe. The ever-widening variety of attacks has made it difficult for companies to protect their assets. 2017 is sure to present security professionals with new challenges as they encounter attacks subtler and more damaging then we’ve seen in the past. Predicting Six Security T
Publish At:2017-01-16 23:40 | Read:5475 | Comments:0 | Tags:CISO Risk Management Chief Information Officer (CIO) Chief I

The CIO Must Take Charge of the Organization’s Application Portfolio

There was a time when every application used in the enterprise application portfolio was either selected and deployed by the chief information officer (CIO) or at least vetted under the management of IT. The advent of software-as-a-service (SaaS) computing options led to the rise of shadow IT, which has allowed individuals to make their own decisions about w
Publish At:2017-01-13 22:00 | Read:4662 | Comments:0 | Tags:Application Security CISO Application Development Chief Info

Move the CSO to a Different Place on the Security Org Chart

The chief information officer (CIO) may be in charge of the data, but who is responsible for enabling security? Where is the dividing line between the responsibilities of the CIO and those of the chief security officer (CSO)? Should there even be a dividing line? We posed these questions and more to Bil Harmer, a strategist working in the office of the chief
Publish At:2017-01-06 17:25 | Read:4546 | Comments:0 | Tags:CISO C-Suite Chief Information Officer (CIO) CSO Executives

A User’s Guide to Cybersecurity Leadership

Cybersecurity leadership begins at the top, with the chief information officer (CIO) and chief information security officer (CISO). That is the simple part. While leadership is never easy, it is fairly uncomplicated to grasp nonetheless. The complicated part of IT leadership is understanding the security threats that organizations face and where they come fr
Publish At:2016-12-27 17:15 | Read:4387 | Comments:0 | Tags:CISO Risk Management C-Suite Chief Information Officer (CIO)

First Day on the Job for a Typical CIO or CISO

The first day on the job for a typical chief information officer (CIO) or chief information security officer (CISO) can be a challenge. There is plenty to do, people to meet, and systems, policies and processes to learn, not to mention the task of getting used to the corporate culture. There are also important questions to ask. For instance, did the company
Publish At:2016-12-20 17:20 | Read:3440 | Comments:0 | Tags:CISO Chief Information Officer (CIO) Chief Information Secur

Key Components of a High-Performing Information Risk Management Program

Although initially driven by specific events and media hype, the elevation of information risk issues to the executive decision-making levels shows no sign of being reversed. While the role and scope of information risk management (IRM) programs continually evolve, there is a broad consensus around its interdisciplinary nature and the need to prioritize poli
Publish At:2015-06-19 12:30 | Read:3323 | Comments:0 | Tags:Risk Management Chief Information Officer (CIO) Chief Inform

C-Suite Spotlight: Chapman University CIO Helen Norris

Helen Norris is the CIO at Chapman University, where there has been a strategic plan for growth — the college is now four times the size it was 20 years ago — shifting from mainly liberal arts to a more comprehensive program. Because universities need to keep their systems more open and accessible than corporations, they are a logical starting point for hack
Publish At:2015-06-09 13:20 | Read:3937 | Comments:0 | Tags:CISO Academia C-Suite Spotlight Chief Information Officer (C

Data Security Requires a Symbiotic Relationship Between the CFO, CIO and CISO

If there was ever a doubt as to the symbiotic nature of the relationships between the chief financial officer (CFO), chief information officer (CIO) and chief information security officer (CISO), the current data security calamities of 2015 have served to remove any doubts. The IBM X-Force Interactive Security Incidents visualization of the 53 noteworthy inc
Publish At:2015-04-09 01:25 | Read:3088 | Comments:0 | Tags:Banking & Financial Services CISO Data Protection Fraud Prot


Share high-quality web security related articles with you:)


Tag Cloud