Menu

Blogs

Showing Blog Posts: 1–10 of 74 tagged CISO

  • 10 Attributes of a NextGen Security Program

    by Rook Security on November 30, 2016

    By Mat Gangwer, CTO, Rook Security The uptick in the number of data breaches in the recent months has placed more focus and attention on companies’ security processes and programs. It is critical to begin planning and executing a security program with the proper tools in place to efficiently block, notify, and respond to threats while effectively controlling security resources and utilization to…

  • RSA Conference: Our Most Popular Posts from October 2016

    by Jennifer Lawinski on November 10, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of October this year? Top Blog Posts 1. Embracing the…

  • Boards of Directors Are Driven Primarily by Compliance, Not Fear

    by Ryan Stolte on November 9, 2016

    Cybersecurity and risk are hot topics in the boardroom. Board members are increasingly asking CISOs to explain how they are protecting the company so that they can make informed cybersecurity decisions. In June 2016, we released a report, How Boards of Directors Really Feel About Cyber Security Reports that illustrated the increasing pressure for CISOs to present understandable and actionable…

  • Getting to Know the RSAC Advisory Board: Wendy Nather

    by Jennifer Lawinski on October 14, 2016

    Name: Wendy Nather Title and company: Research Director, Retail Cyber Intelligence Sharing Center Number of years in the information security industry: 20 RSAC: What was your first job in the infosec industry? Nather: Director of IT Security for the EMEA region of the investment banking division of Swiss Bank Corporation RSAC: What does the RSA Conference 2017 theme, "The Power of Opportunity,"…

  • RSA Conference: Our Most Popular Posts from September 2016

    by Jennifer Lawinski on October 5, 2016

    We here at RSA Conference are continually striving to bring you excellent content year-round. Whether it's videos from your favorite conference sessions or blog posts from industry experts who can help you solve your toughest cybersecurity issues, we've got your back. What were your favorite RSA Conference blog posts and videos in the month of September this year? Top Blog Posts 1. Why Study C…

  • It Takes a Village to Manage Cyber Risk

    by Ryan Stolte on September 9, 2016

    When it comes to defending against today’s most sophisticated criminals, it truly takes a village. And I don’t mean solely ensuring employees use strong passwords and avoid clicking on suspicious links. Security teams, line-of-business application owners and boards of directors all must proactively make security their business. Each stakeholder plays a role in ensuring the most severe threats are…

  • Privacy on the Ground: Driving Corporate Behavior in the United States and Europe

    by Ben Rothke on May 23, 2016

    Many countries take the approach that the best ways to solve problems are via regulations. In some cases, that will work. In others, these regulations are simply a penalty that everyone must bear; think TSA. When it comes to information security and privacy laws and regulations, often those perpetrating the crimes are impervious to any or regulation. In Privacy on the Ground: Driving Corporate…

  • Information Assurance Handbook: Effective Computer Security and Risk Management Strategies

    by Ben Rothke on April 1, 2016

    The notion of information assurance is not necessarily synonymous with information security. In Information Assurance Handbook: Effective Computer Security and Risk Management Strategies, (McGraw-Hill Education ISBN-13: 978-0071821650), authors Corey Schou and Steven Hernandez examine the subtle differences. Information assurance is about assuring information and managing risks related to all…

  • How to Become a Super CISO

    by David Needle on March 10, 2016

    Want to be the best CISO you can be? Take a word of advice from Todd Fitzgerald, Global Director of Information Security at Grant Thornton International, who gave a detailed and often entertaining presentation on Friday, the last day of the RSA Conference. Fitzgerald talked about his own journey to becoming a security professional, the current state of security affairs, and what’s needed going…

  • CISOs Share Tales From the Trenches at RSA Conference 2016

    by Tony Kontzer on March 3, 2016

    There are many themes that stretch across the information security world, but most organizations face their own particular challenges that require customized approaches. This was the clear takeaway from a well-attended panel at the RSA Conference Thursday, Lessons Learned from Real-World CISOs, during which CISOs from the medical device, education, health insurance and consumer goods sectors…

This document was retrieved from https://www.rsaconference.com/blogs on Thu, 08 Dec 2016 20:53:44 -0500.
© 2016 EMC Corporation. All rights reserved.