Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di Cyber Security
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: CISO Strategy

  1. Home
  2. CISO Strategy

The CISO Carousel and its Effect on Enterprise Cybersecurity

the-ciso-carousel-and-its-effect-on-enterprise-cybersecurity

CISO churn is a hidden cybersecurity threat. Major security initiatives or implementations can take longer than the residency of a single CISO, and constant churn can leave cracks or gaps in security.

The post The CISO Carousel and its Effect on Enterprise Cybersecurity appeared first on SecurityWeek.

CISOs and Board Reporting – an Ongoing Problem

cisos-and-board-reporting-–-an-ongoing-problem

Boards often complain they receive overly-technical reports from management teams that fail to put governance in business and financial terms.

The post CISOs and Board Reporting – an Ongoing Problem appeared first on SecurityWeek.

The Team8 Foundry Method for Selecting Investable Startups

the-team8-foundry-method-for-selecting-investable-startups

Team8, a VC organization with added sauce, queried more than 130 CISOs from its own ‘CISO Village’ to discover the concerns of existing cybersecurity practitioners, and the technologies they are seeking for the future.

The post The Team8 Foundry Method for Selecting Investable Startups appeared first on SecurityWeek.

CISA Hires ‘Mudge’ to Work on Security-by-Design Principles

cisa-hires-‘mudge’-to-work-on-security-by-design-principles

Peiter ‘Mudge’ Zatko joins the US government’s cybersecurity agency to preach the gospel of security-by-design and secure-by-default development principles.

The post CISA Hires ‘Mudge’ to Work on Security-by-Design Principles appeared first on SecurityWeek.

The End of “Groundhog Day” for the Security in the Boardroom Discussion?

the-end-of-“groundhog-day”-for-the-security-in-the-boardroom-discussion?

As the SEC cyber incident disclosure rules come into effect, organizations will be forced to seriously consider giving security leaders a seat at the table.

The post The End of “Groundhog Day” for the Security in the Boardroom Discussion? appeared first on SecurityWeek.

Reddit Taps Fredrick ‘Flee’ Lee for CISO Job

reddit-taps-fredrick-‘flee’-lee-for-ciso-job

Reddit hires a 20-year cybersecurity veteran to manage its privacy and security functions as it prepares for an IPO.

The post Reddit Taps Fredrick ‘Flee’ Lee for CISO Job appeared first on SecurityWeek.

CISO Conversations: Field CISOs From VMware Carbon Black and NetSPI

ciso-conversations:-field-cisos-from-vmware-carbon-black-and-netspi

SecurityWeek talks to Field CISOs, Fawaz Rasheed (VMware Carbon Black) and Nabil Hannan (NetSPI), about this emerging role.

The post CISO Conversations: Field CISOs From VMware Carbon Black and NetSPI appeared first on SecurityWeek.

CISO Conversations: CISOs of Identity Giants IDEMIA and Ping

ciso-conversations:-cisos-of-identity-giants-idemia-and-ping

SecurityWeek talks to Dennis Kallelis (CSO at Idemia) and Jason Kees (CISO at Ping), two of industry’s identity giants. The idea, as always, is to discuss the role of the modern CISO.

The post CISO Conversations: CISOs of Identity Giants IDEMIA and Ping appeared first on SecurityWeek.

CISOs’ New Stressors Brought on by Digitalization: Report

cisos’-new-stressors-brought-on-by-digitalization:-report

Digitalization brings new security challenges, new concerns, and new threats, and CISOs should not think that it’s just business as usual.

The post CISOs’ New Stressors Brought on by Digitalization: Report appeared first on SecurityWeek.

CISO Conversations: Three Leading CISOs From the Payment Industry

ciso-conversations:-three-leading-cisos-from-the-payment-industry

SecurityWeek talks to Chief Information Security Officers from Bill.com, FreedomPay, and Tassat about their role and experience as CISOs.

The post CISO Conversations: Three Leading CISOs From the Payment Industry appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di Threat Intelligence e Cyber Intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it