A new IBM study identifies three distinct types of information security leaders: Influencers, Protectors and Responders. Which type are you? IBM's Marc van Zadelhoff offers tips for more effective leadership.
Big data, as Bernt Ostergaard notes, is hot, and using tools to analyze massive amounts of data in a variety of forms is being employed to identify trends that can help leaders accomplish their goals.
Where do time-strapped senior leaders go for education on cyber forensics and incident response? Carnegie Mellon University has a new option, and Dena Haritos Tsamitis explains its unique approach.
Information security leaders should hire a breach resolution vendor before their company experiences a data breach to help ensure rapid, appropriate response, says security consultant Robert Peterson.
With their organizations' finances and reputations being pressured by a rapidly evolving threat landscape, see what IT security leaders need to know now to prevent damage in the future.
"Getting that top level support is the first step to making everything else happen," says Ron Ross, senior fellow at the National Institute of Standards and Technology.
Jason Clark, CSO of Websense, has spent a significant amount of time meeting with over 400 CSOs. From his interactions, Clark offers his advice on how chief information security officers can be more effective.
"It was purely my networking that saved us and gave us time to defend ourselves appropriately," says Abbas Kudrati of the National Bank of Kuwait, following a recent cyber incident that impacted the bank.
"This is a unique program that fits the specific needs for upcoming and current IT security leaders and adds high enrichment to peer support and the learning experience," says Dena Haritos Tsamitis.
Winning CEOs' support for information security investments requires clearly explaining the business impact of inadequate security, says consultant Eric Mueller.
The book provides information security leaders tips to identify insiders who can cause damage to information systems and data and guidelines on protecting their organizations from such individuals.
Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing mobile security and other challenges.
To keep up with emerging technologies and strengthen focus on IT risk and compliance issues, ISACA has recently updated its Certified Information Security Manager exam. Read about the key changes.
"You need a CISO today to manage not only the IT risks, but understand and influence the business risks that are imposed on the company by the decisions and strategies it takes," says John South, CISO at Heartland Payment Systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.