Steve Katz, the world's first CISO, who cut his teeth at Citi and Merrill Lynch, stays current with emerging tech and business trends, and he has advice to share with the next generation of cybersecurity leaders.
Career privacy officer Michelle Dennedy now finds herself in a unique position as CEO of DrumWave, a startup data services company. At a time when privacy is a growing business imperative, what influence can she bring to this leadership role?
Marc Rogers has been a hacker since the 1980s - notable as organizer of DEF CON - and he is pleased to see his unique set of skills now embraced by the industry and being used to make cybersecurity smarter and easier to use.
Art Coviello, a partner at Rally Ventures and former CEO of RSA, recently met with a group of CISOs on the topic of presenting to the board. He was surprised - and not in a good way - at what he heard. Here are his tips for talking cybersecurity with senior business leaders.
CISO stress levels are higher this year than last. What is the impact on these individuals and their enterprises? And what should be done to alleviate this stress? Stuart Reed of Nominet analyzes the latest CISO Stress report.
In an RSA 2020 conference keynote, Cisco's Wendy Nather spoke of "democratizing security" - thinking differently about the people we serve and secure. She expands on that theme and discusses her role as head of advisory CISOs at Cisco's Duo Security unit.
What are enterprises seeking in their next CISO - a technologist, a business leader or both? Joyce Brocaglia of Alta Associates shares insights on the key qualities she's looking for when recruiting CISOs.
Ex-federal CISO Gregory Touhill, a retired general, understands the global staffing crunch. Now, as president of AppGate Federal and as a board member for ISACA, he shares new insights on how to tackle cybersecurity recruiting and retention.
Global enterprises have spent a decade fighting the cybersecurity skills shortage, and Exabeam CEO Nir Polak has ideas about how automated tools can help fill the gap.
Are you attending the RSA 2020 conference? To help navigate the show, here's a preview of 12 top keynote sessions featuring some of the biggest names in cybersecurity tackling critical subjects, including cryptography, critical infrastructure security, bug bounties and supply chain risks.
You already have some sort of third party security program in place - perhaps you've built a security questionnaire based on internal policies or an industry standard such as ISO or NIST. You may have even "right-sized" your questionnaire specifically for different types of supplier relationships and developed a few...
Traditional, questionnaire-based vendor management programs have become ineffective - and nothing makes that more evident than being able to document the most frequently heard "excuses" from third parties as to why it didn't work. While third parties continue to grow as a leading threat vector for data breaches,...
Information Security Media Group, a premier media partner at the annual RSA Conference, will conduct over 200 video interviews at this year's event with cybersecurity thought leaders, executives, CISOs and sponsors.
If your organization does software development in-house, there are a myriad of development workflows and processes to choose from. Some organizations still implement old-school waterfall development workflows; some are agile shops. In terms of process, some have adopted DevOps, and some integrate security testing into...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.