Gartner Director Analyst Tisha Bhambry and data security adviser and vCISO Jatinkumar Modh discuss the workplace challenges CISOs face and how an emerging group of virtual CISOs can offer fresh perspectives and solutions to organizations that lack cybersecurity resources.
Chief information security officers are challenged with building high-functioning cybersecurity teams amid an impossible labor and skills market. Here are strategies they can use to assemble teams capable of defending their organizations against the myriad of cyberthreats they face daily.
The underrepresentation of women in cybersecurity is a complex issue. The reasons behind it include stereotypes and biases, educational barriers, workplace culture, and the lack of visibility and role models. We need to consider the implications and discuss potential strategies for change.
In the aftermath of a ransomware attack several years ago, Hackensack Meridian Health embarked on transforming its cybersecurity program with the support of top leadership and increased funding and staff and by implementing critical security tools and best practices, said CISO Mark Johnson.
Six years after it was founded, the UK Cyber Security Council is taking a multipronged approach to building professionalism in the industry. Board Chair Claudia Natanson discussed the council's journey, its role in shaping industry standards and efforts to foster diversity and narrow the skills gap.
In establishing a robust security culture, the integration of security awareness and compliance training is vital. This cohesive approach bolsters the defense layer across digital and physical realms, reducing risks associated with noncompliance such as fines and reputational damage.
There's significant content...
Improving the security culture of your organisation can seem daunting.
An entire culture sounds almost too big to influence. But influencing security culture is possible, with the right plan, buy-in and content.
With the right culture supporting them, your users will be better equipped to identify potentially...
International organisations are racing to comply with evolving cybersecurity regulations amidst a surge in cross-border cyber-attacks. These regulations aim to fortify defenses against threats to data, finances, and reputation.
However, the complexity of directives often leaves CISOs and their teams feeling...
Leaders in cybersecurity - and in any other business - need to keep a bank account filled with the trust and respect of their employees and make sure that account stays in the black, said Chase Cunningham, aka the Doctor of Zero Trust. He discussed his new book on how to be a good leader.
According to a new survey from ISC2, the nonprofit member organization that promotes cybersecurity education, 82% of cybersecurity professionals say AI will improve their job efficiency by helping them conduct analysis, automate tasks, perform monitoring, predict vulnerabilities and block threats.
Knowing how competent we are and how we stack up against peers gives us the ability to decide when we can proceed based on our own experience and when we need to seek advice. But psychological research says we are lousy at evaluating our own capabilities and frequently overestimate our skills.
Welcome to Google Cloud's Cybersecurity Edition of the First Annual Generative AI Survey, brought to you by Information Security Media Group (ISMG). This survey of over
400 business and cybersecurity professionals conducted in
H2 2023 comprises responses from two groups, business
leaders – comprising CIOs, board...
Business leaders and security leaders agree on
the importance of cybersecurity, but there are
significant differences in how the two groups
perceive and prioritize the threats and view the
role of the other party.
Welcome to the report summarising the survey:
Key Security Challenges and Tooling
Approaches for 2024.
In Q4 2023, ISMG surveyed more than 350 senior cybersecurity professionals to:
Identify what trends they are seeing grow in importance when it comes to security concerns;
Understand the priorities for tooling...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.