Patching is among the primary challenges facing enterprises in their adoption of IoT devices. Fortinet's Darren Turnbull shares insight on how to anticipate and respond to the top security obstacles.
The IT security industry must do a much better job of persuading young people with the requisite math and science skills to join the cybersecurity workforce rather than choose another profession, says David Shearer of (ISC)².
Do CISOs need mentoring? Daniel Lohrmann shares insights on the importance of mentoring CISOs to enable them to spot growth opportunities and also to build up their interpersonal skills.
In the wake of the breaches suffered by JPMorgan Chase, Sony and Anthem, attack attribution and information sharing are playing more prominent roles for banking leaders, and they will be key discussion points at the upcoming RSA Conference 2015 in San Francisco.
Large enterprises are engaging new digital business models as part of their growth strategy. Such innovation gives rise to the increase of the new "digital risk officer," says Gartner's Sid Deshpande.
Weaponized roller coasters? Kidnappers hacking babycams? Forget over-the-top "CSI: Cyber" hacking plots. The hackers behind the Rogers ISP breach, in their quest for bitcoins, claim they wielded nothing more serious than a telephone call.
Chris Buse, CISO for the state of Minnesota, says centralizing IT systems should make it easier to defend against cyber-attacks because there are fewer computing environments to protect.
CISOs considering new opportunities in the consulting arena can learn from the experience of Vishal Salvi, former CISO at HDFC bank, who's now a cybersecurity adviser at PricewaterhouseCoopers.
President Obama has tapped veteran CIO Tony Scott as the top government IT official whose responsibilities include overseeing agencies' compliance with FISMA, the law that governs federal government IT security.
Texas Chief Information Security Officer Brian Engle, like other CISOs, has voiced concerns that the state government didn't have sufficient staffers and managers with the right set of IT security skills. Engle, however, did something about it.
If 2014 was a harbinger of things to come, 2015 will be a banner year for IT security employment. Government statistics show that employment in one segment of the IT security workforce - information security analysts - soared by 42 percent in 2014.
CISOs are moving from being entrenched in technology issues to becoming more involved in top-level business matters, which requires new skills, says George McCulloch, who leads the new Association for Executives in Healthcare Information Security.
To help protect health data as cyberthreats evolve, healthcare CIOs must roll out a "blended strategy" for security, says Charles Christian, new chairman of the College of Healthcare Information Management Executives, an association of CIOs.
Driven by the spectre of external threats, attacks and growing business expectations, can CISOs focus on risk management and take a more integrated and systematic approach to defend against attacks?
As David Shearer steps in as the new executive director of (ISC)², he inherits a huge challenge: How does the consortium respond appropriately to the global information security staffing shortage?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.