Menu

Blogs

Showing Blog Posts: 1–10 of 69 tagged CISO

  • It Takes a Village to Manage Cyber Risk

    by Ryan Stolte on September 9, 2016

    When it comes to defending against today’s most sophisticated criminals, it truly takes a village. And I don’t mean solely ensuring employees use strong passwords and avoid clicking on suspicious links. Security teams, line-of-business application owners and boards of directors all must proactively make security their business. Each stakeholder plays a role in ensuring the most severe threats are…

  • Privacy on the Ground: Driving Corporate Behavior in the United States and Europe

    by Ben Rothke on May 23, 2016

    Many countries take the approach that the best ways to solve problems are via regulations. In some cases, that will work. In others, these regulations are simply a penalty that everyone must bear; think TSA. When it comes to information security and privacy laws and regulations, often those perpetrating the crimes are impervious to any or regulation. In Privacy on the Ground: Driving Corporate…

  • Information Assurance Handbook: Effective Computer Security and Risk Management Strategies

    by Ben Rothke on April 1, 2016

    The notion of information assurance is not necessarily synonymous with information security. In Information Assurance Handbook: Effective Computer Security and Risk Management Strategies, (McGraw-Hill Education ISBN-13: 978-0071821650), authors Corey Schou and Steven Hernandez examine the subtle differences. Information assurance is about assuring information and managing risks related to all…

  • How to Become a Super CISO

    by David Needle on March 10, 2016

    Want to be the best CISO you can be? Take a word of advice from Todd Fitzgerald, Global Director of Information Security at Grant Thornton International, who gave a detailed and often entertaining presentation on Friday, the last day of the RSA Conference. Fitzgerald talked about his own journey to becoming a security professional, the current state of security affairs, and what’s needed going…

  • CISOs Share Tales From the Trenches at RSA Conference 2016

    by Tony Kontzer on March 3, 2016

    There are many themes that stretch across the information security world, but most organizations face their own particular challenges that require customized approaches. This was the clear takeaway from a well-attended panel at the RSA Conference Thursday, Lessons Learned from Real-World CISOs, during which CISOs from the medical device, education, health insurance and consumer goods sectors…

  • Make Sure You Don’t Miss These Peer2Peer Sessions at RSAC 2016

    by Jennifer Lawinski on February 24, 2016

    Are you still trying to choose which Peer2Peer conversations you'd like to join at the RSA Conference this year in San Francisco? Peer2Peer sessions are group discussions around specific security topics, where participants get the chance to really dig deeply into a topic that that care about with a group of peers. This year we've once again asked the discussion facilitators to help explain what…

  • Security Planning for the Year Ahead: Are You Hoarding Big Data?

    by David Needle on January 25, 2016

    Another year, another round of threats and challenges you find facing all of you responsible for security at your company or organization. While it’s impossible to anticipate all threats in the ever-changing security landscape, there are steps you can take to be better prepared—if not also proactive—for what’s to come in 2016 and beyond. In the first of a three part series, I want to share…

  • Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

    by Ben Rothke on January 19, 2016

    Anyone who has spent time in the information security industry knows what while there is good data around; there is a lot to be desired in terms of empirical and measurable information security data. There’s too much marketing hype, combined with firms who often don’t know how to make sense out of their own data. In Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems…

  • Your Security Resolutions for 2016

    by Wendy Nather on January 14, 2016

    We start the New Year with the best of intentions. We're going to join an ISAC and work out every day; consume only healthy and organic data; clean out our overstuffed Hadoop clusters and get rid of that out-of-fashion data; and measure our performance to match our goals. Oh yes, and we're going to stay within the security budget. But making lifestyle changes is hard, especially in security, where …

  • The CISO's End-of-Year Questionnaire: How Do You Show Security Success

    by RSAC Contributor on December 28, 2015

    With the end-of-the-year looming, CSOs/CISOs have to update the Board of Directors on how the company fared security-wise over the past year. Todd Feinman, CEO and founder of data management company Identity Finder, provides a checklist to guide that conversation. How do CSOs show security successes? The end of year boardroom discussion will focus primarily on 5 principal questions: 1. Were there…

Are you interested in contributing to the RSA Conference blog?  Download our 2016 Editorial Calendar for more info.

This document was retrieved from https://www.rsaconference.com/blogs on Wed, 28 Sep 2016 19:54:57 -0400.
© 2016 EMC Corporation. All rights reserved.