Cloud-based services are affecting governance, risk management and compliance practices in Australia, says Tim Nedyalkov, who is a technology information security officer with Commonwealth Bank. He discusses the differences between how managers and practitioners approach the problems.
Tammy Klotz took on a new job at a new company and even in a new state in 2020 - and she was charged with both establishing herself and raising the firm's cybersecurity posture. No challenge during a global pandemic, right? Here is how she has begun to pave her way.
Bobby Ford of Hewlett Packard Enterprise says that too often when an organization engages with security, it happens in an ad hoc way. He describes his mission to create a Cybersecurity Center of Excellence to streamline the organization's security incident management and response processes.
Key challenges from the recent State of Cybersecurity 2021 report include "integrating risk with maturity and keeping up with industry trends," says Jenai Marinkovic, member of the ISACA Emerging Trends Working Group.
When Conrad Bell joined C Spire, the cybersecurity team numbered one - him. Today he has a thriving team. The VP and CISO explains how he built it, describes the skills he values and tells how this team is helping the telecommunications firm respond to today's daunting cybersecurity challenges.
The threat landscape has grown, and the airlines industry in particular has been challenged. As a result, Rob Hornbuckle, CISO of Allegiant Airlines, sees his role differently: It's beyond security and about more than just the business. Where is the role going, and how does one grow with it?
Given that budgets and time are finite, how can organizations best identify if their information security strategy is well balanced and appropriate? Nandhini Duraisamy, chief operating officer of Quadron Cybersecurity Services, shares best practices.
In the latest weekly update, four editors at Information Security Media Group discuss timely cybersecurity issues, including cryptocurrency exchange hacks and the cyber implications of the U.S. withdrawal from Kabul.
The latest edition of the ISMG Security Report features an analysis of the cybercrime-as-a-service model and how law enforcement could potentially disrupt it. Also featured: T-Mobile probes a massive data breach; tackling abuse in the workplace.
A group of cybersecurity professionals has launched Respect in Security to take a stand against all forms of harassment within the industry. Initiative co-founders Lisa Forte and Rik Ferguson describe their commitment to creating workplaces free from harassment and fear.
Like many CISOs, Lisa Tuttle of SPX Corp. spent years trying to raise the corporate profile of her cybersecurity organization. Now, in the wake of so many high-profile attacks, she has senior management's full attention. The challenge: How do you maintain influence?
CISO Gary Hayslip prides himself on being a mentor to up-and-coming cyber pros. But he also takes leadership roles in two causes that don't get nearly as much attention: stress management and building a more neurodiverse workforce.
As a cybersecurity leader, it's one thing to earn a seat at the senior management table, but it's quite another to find - and use - your voice in that role, says Alex Cunningham, CISO at Advisor360°, who discusses leadership and how to create a cybersecurity culture.
The CISO/board relationship is an hot topic, and Selim Aissi has a unique perspective. Besides serving as a board member on several organizations, he has been regularly reporting to the private and public company boards in his role as CISO. So he knows exactly what CISOs should be conveying - and how.