HackDig : Dig high-quality web security articles for hacker

What Can We Learn From the ‘Global State of Information Security Survey 2018’?

In October 2018, PricewaterhouseCoopers (PwC) released the latest edition of “The Global State of Information Security Survey.” For this report, the professional services firm surveyed over 9,000 leaders, including CEOs, chief financial officers (CFOs), chief information officer (CIOs) and chief information security officers (CISOs), from 122 cou
Publish At:2017-11-02 13:10 | Read:299 | Comments:0 | Tags:Risk Management Chief Information Officer (CIO) Chief Inform

Don’t Panic! Create a Winning Cybersecurity Strategy to Preserve CISO Sanity

Stress comes with the territory for chief information security officers (CISOs). As noted by Medium, the job is unpredictable, with “long periods of preparing, watching, waiting, punctuated by periods of high stress and occasional bruising.” As both vendors and cyberthreats proliferate, finding a balance between an effective cybersecurity strateg
Publish At:2017-10-31 05:50 | Read:158 | Comments:0 | Tags:CISO Automation C-Suite Chief Information Security Officer (

Don’t Let Organizational Politics Derail Security Initiatives

Information security is vastly complex, both technically and from a governance, risk and compliance (GRC) perspective. When workplace politics come into play, security best practices become more complicated and risk management is weakened significantly. Security professionals commonly meet resistance when they attempt to implement IT initiatives that do not
Publish At:2017-10-22 05:00 | Read:140 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Execu

Risk Analysis Versus ROI: Communicating the Value of Security Without Hidden Asterisks

When things go wrong with computer systems and networks, whether due to ordinary mishaps or malicious actors, the organizations that rely on those systems and networks are put at risk. They may suffer direct financial losses, reputational damage or both, with effects ranging from inconvenience to total loss and liquidation of the enterprise. Understanding th
Publish At:2017-10-05 16:00 | Read:275 | Comments:0 | Tags:Risk Management Executives Risk risk analysis Risk Assessmen

Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration

When I think about my family vacations from childhood, I remember camping trips, hours on the beach, sharing stories around the campfire and the fun my siblings and I used to have in the back seat of the car — jumping on each other, switching seats and hopping from the third row into the front seat. Half the fun was enabled by the fact that we had no seat be
Publish At:2017-10-04 21:35 | Read:148 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Cyber

No Time for Techno-Babble: Four Key Traits of Quality CISO Reports

Board directors have very little patience for technical jargon. Given the tremendous pressure executives are under to avoid headline-grabbing data breaches, CISO reports should align enterprise risks with their potential impacts on business objectives in terms that nontechnical board members can easily understand. An EY report titled “The Evolving Role
Publish At:2017-09-18 17:25 | Read:241 | Comments:0 | Tags:CISO Risk Management C-Suite Chief Information Security Offi

The New CISO: Management Through Thought Leadership

CISOs have a difficult path to success because their area of expertise is highly technical and one that few care to understand on a deep level. The success of today’s IT security leaders depends on their thought leadership and ability to present a continuous flow of understandable and interesting information that informs colleagues without jargon or fe
Publish At:2017-09-14 21:10 | Read:168 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Execu

Board Directors Need to Get Involved With Cyber Risk Governance

Board directors are under a lot of pressure. They know that it’s only a matter of time before their organization suffers a cyber incident, and all eyes will naturally be on the directors themselves to see if they were properly exercising their risk oversight. Directors also know that all interactions with the CISO will be subject to close scrutiny in t
Publish At:2017-08-24 16:50 | Read:295 | Comments:0 | Tags:CISO Risk Management Cyber Risk Cybersecurity Cybersecurity

The Five Most Critical Tasks in the CISO Job Description

Job descriptions are important in defining the responsibilities of a role, but the real job often gets lost in the details. Organizations must ensure that their employees — especially chief information security officers (CISOs) — are completing the tasks they were hired to perform. Otherwise, they run the risk of critical processes breaking down and data bei
Publish At:2017-08-23 22:25 | Read:175 | Comments:0 | Tags:CISO Chief Information Security Officer (CISO) Executives Pr

Testing Top Leadership’s Muscle Memory With Data Breach Simulations

How would your organization’s leadership fare in its response to a full-on data breach? Regular and ongoing training can improve top leaders’ ability to respond to a cybersecurity breach and avoid doing additional damage to the reputation of the company as they deal with the repercussions. Organizations simply cannot afford to be lax about their
Publish At:2017-08-14 16:55 | Read:401 | Comments:0 | Tags:CISO Incident Response C-Suite Data Breach Executives IBM X-

Four Ways CISOs Can Play a Key Role in Educating Top Leadership About Cyber Risks

“There are known knowns; there are things we know we know. We also know there are known unknowns; that is to say we know there are some things we do not know. But there are also unknown unknowns — the ones we don’t know we don’t know.” — Donald Rumsfeld, former U.S. Secretary of Defense Board directors are under pressure to demonstr
Publish At:2017-06-28 14:55 | Read:649 | Comments:0 | Tags:CISO Risk Management Chief Information Security Officer (CIS

Don’t Sit Back and Wait for Security Risks to Disappear

Risk management is the essence of what we do as information security professionals. We identify key security risks and analyze those risks in the context of the business. We then communicate the confirmed or potential outcomes to management. Finally, we decide — or wait for decisions — on how to respond. Misguided Decisions Many security challenges begin at
Publish At:2017-05-24 19:10 | Read:608 | Comments:0 | Tags:CISO Risk Management Chief Information Security Officer (CIS

Is the CISO Job Market Overcrowded?

Is there an oversupply of chief information security officers (CISOs) in the cybersecurity job market? According to an Indeed report, the answer is yes — but the study’s statistics don’t tell the whole story. The economists behind the study found that employee interest in the CISO job market in the U.S. is more than double the actual demand for t
Publish At:2017-05-14 01:10 | Read:499 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Execu

Building an Effective CISO-CIO Partnership

For many, the most common reporting structure in today’s business environment is overly complicated. The majority of security leaders around the world report directly to the chief information officer (CIO), which can cause an enormous amount of conflict. That reporting structure, however, is slowly changing for some companies. In those organizations,
Publish At:2017-04-27 01:10 | Read:917 | Comments:0 | Tags:CISO Government C-Suite Chief Information Officer (CIO) Chie

CISO Succession Planning Takes Preparation

The chief information security officer (CISO) position is among the most difficult roles to fill because the pool of qualified applicants is small and the job market is highly competitive. That’s why career succession planning is important for the enterprise and its staff. Six Keys to Successful Succession Planning Incumbent CISOs need to devote atte
Publish At:2017-04-24 18:00 | Read:698 | Comments:0 | Tags:CISO C-Suite Chief Information Security Office (CISO) Execut

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud