Search

Your search keyword '"CISO"' showing total 339 results

Search Constraints

Start Over You searched for: "CISO" Remove constraint "CISO" Search Limiters Full Text Remove constraint Search Limiters: Full Text Topic science and technology Remove constraint Topic: science and technology
339 results on '"CISO"'

Search Results

2. Cool in a crisis: how you communicate during an attack is as important as your response, says Ron Green, CISO, MasterCard

4. Offensive line: with saboteurs plundering organizations of coveted assets, it's time to fight back, says Joel Yonts, CISO of a Fortune 500 merchant. Dan Kaplan reports

6. Ground control: when the going gets tough, Lockheed Martin CISO Chandra McMahon responds with mature incident response

7. Assume the worst: if hackers want in, they will prevail. The key is being ready, says Larry Whiteside, CISO, visiting nurse service of New York. Dan Kaplan reports

8. CSO of the year: working with business partners throughout the organization is key, says CUNA Mutual Group CISO Scott Sysol

9. In the driver's seat: Preston Wood is one CISO on top of the integration of enterprise security and networking operations, says Jim Carr

11. Seizing management power: over the past decade, the role of the CISO has morphed from introverted techie into slick businessperson, reports Dan Kaplan

12. Response ability: when a breach occurs, customers expect more than an apology, says Bob Maley, Pennsylvania's CISO. Dan Kaplan reports

13. Data driven: Alex Tosheff, Bill Me Later's new CISO, says understanding and protecting data is now priority number one, reports Dan Kaplan

15. Weathering the storm: John Penrod, CISO of The Weather Channel, discusses how the IT pro can manage business risk, reports Dan Kaplan

16. Customer connect: Bruce Bonsall, CISO, MassMutual, says many businesses today are leveraging security as a market differentiator, reports Dan Kaplan

17. CISO leadership; effective principles for success

18. Stop blaming the victim; We must shift the way that we view data breaches, says CISO

19. Technology to strategy: today's CSO/CISO must effectively communicate to senior leaders about the need for security, reports Fahmida Y. Rashid

20. The CISO runs with it

21. Gregory Wood has been named CISO at Washington Mutual

22. HIPAA & the trusted user: protecting against internal threats takes a combination of vigilance and the latest technology, says CIGNA's CISO Craig Shumard

23. Before you take the plunge ... prior to a job switch, ask questions to learn if the company you are considering is in good shape, says former Yahoo CISO Justin Somaini

24. Ms. CISO

25. CISO duties

26. Benefits of DIY risk assessment: enterprises can achieve ROI by doing an in-house risk assessment, says Kris Rowley, CISO of the state of Vermont

28. Is the CISO gaining influence?

29. Best practices for today's CISO: by aggregating information, executives can ease regulatory burdens, says

30. Of influence: the influence of each of these five leaders--either through policy prowess or technical acumen--will continue to ripple through the vast ocean of cybersecurity

31. A seat on the board... for real: with the cyberworld equivalent of Freddie Krueger, Jason and Michael Myers all bearing down, boards realize it's time to take action

32. SecureData

33. Assess the risk: CISOs say the best IT security programs build risk management into everything

34. EU Data Protection Regulation: Rocky road to compliance: the EU is inching ever closer to putting the much-anticipated EU General Data Protection Regulation on the statute books, and that could see many companies playing catch up, reports Doug Drinkwater

35. Where are they now? Teri Robinson caught up with a few women we've honored in the past to see how their careers--and the security landscape--have changed

36. Internal review: some in the security industry are working to stem the malicious insider threat, says Dawn Cappelli of Carnegie Mellon. Dan Kaplan reports

38. NATS

40. They said it

41. Norton Rose Fulbright

42. Eddie Schwartz has joined Verizon Enterprise Solutions as the head of its security and cyber intelligence practice

43. Higher purpose

44. A seat earned at the Round Table

45. From the ground up

46. Ensuring a safe enterprise

47. Comparing programs can yield rewards

48. United states lags

49. The Quote

50. CSO of the year

Catalog

Books, media, physical & digital resources