Beyond The Standard CISO Cloud Security Guide

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Thu, 19 Sep 2019 13:53:11 +0000

Verizon recently released a 5 step process for evaluating cloud security products and services to inform purchase decisions. That’s a fantastic tool for buyers to have. This is especially helpful because cloud discussions are almost always driven by business objectives to satisfy a cost and or productivity problem. The CISO has to come in and…

The post Beyond The Standard CISO Cloud Security Guide appeared first on .

Read more

Making the case: How to get the board to invest in higher education cybersecurity

Credit to Author: Joan Goodchild| Date: Wed, 28 Aug 2019 17:31:00 +0000

CISOs working in institutions of higher learning have their own considerations when communicating with the board about risk management. One of the top security officials at Boston College offers his takeaway on what it takes to get board buy-in on campus.

Categories:

Tags:

(Read more…)

The post Making the case: How to get the board to invest in higher education cybersecurity appeared first on Malwarebytes Labs.

Read more

Making the case: How to get the board to invest in government cybersecurity

Credit to Author: Joan Goodchild| Date: Thu, 01 Aug 2019 16:00:00 +0000

CISOs are increasingly tapped to communicate with the board and executive management about security. Here’s what government officials need to know for success.

Categories:

Tags:

(Read more…)

The post Making the case: How to get the board to invest in government cybersecurity appeared first on Malwarebytes Labs.

Read more

A Chief Security Concern for Executive Teams

Credit to Author: BrianKrebs| Date: Tue, 18 Dec 2018 21:23:10 +0000

Virtually all companies like to say they take their customers’ privacy and security seriously, make it a top priority, blah blah. But you’d be forgiven if you couldn’t tell this by studying the executive leadership page of each company’s Web site. That’s because very few of the world’s biggest companies list any security executives in their highest ranks. Even among top tech firms, less than half list a chief technology officer (CTO). This post explores some reasons why this is the case, and why it can’t change fast enough. KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Only a little more than a third even listed a CTO in their executive leadership pages.

Read more

What’s causing the cybersecurity skills gap?

Credit to Author: Kayla Matthews| Date: Thu, 21 Jun 2018 15:00:00 +0000

More than 50 percent of companies report problematic shortages in the security skills of their staff. What’s causing the cybersecurity skills gap? And what are some potential solutions for closing it?

Categories:

Tags:

(Read more…)

The post What’s causing the cybersecurity skills gap? appeared first on Malwarebytes Labs.

Read more