It’s no secret that employees – whether they’re your employees or a partner’s – are the weakest link in your cybersecurity program. Regardless of an organization’s product, service, size, or industry, employees play an integral role in ensuring the business operates efficiently. Unfortunately, employees also play an integral role in exposing the organization’s intellectual property to unauthorized parties.
CISO Interviews
Here’s How New CISOs Set a Course for Success
When a CISO starts a new job, she naturally wants to build a cybersecurity program of which she and her employer can be proud. But her success depends largely on the tools she has, including people, tools, and processes.
Jimmy Xu Answers Your DevSecOps Questions
Jimmy Xu, Director of DevSecOps & Cloud Security at Trace3, recently presented “Mastering DevSecOps.” Jimmy’s presentation generated lots of great questions, which he graciously answered below. If you missed his presentation or would like to watch it again, you can view it below.
Why Hackers Can’t Wait for School to Start
Schools will struggle with more than COVID-19 as kids return this Fall – whether virtually, on campus, or a combination of the two. Colleges and universities contain lots of sensitive data that hackers cherish. Unless schools protect this PII, PHI, and IP, hackers will use it for social engineering, financial fraud, or a competitive advantage.
It’s the Service Providers You Value the Most That Hurt You the Worst
No man is an island. The same can be said about your business. Your organization relies on countless people for its survival, let alone its success. Ironically, many of these contributors work for someone else. Suppliers, vendors, consultants, contractors, and other service providers deliver tremendous value to organizations. Unfortunately, these service providers also pose significant risk.
Want to Close the Skills Gap? Here’s How.
The only constant in life is change. Sometimes change comes from an existential crisis. Need proof? Ask a CISO. The cybersecurity function traditionally solved technology problems with technology solutions. Cybersecurity experts learned however that technology is only part of the equation. Businesses do not function without people.
The One Healthcare Technology That Makes a CISO’s Blood Boil
On one hand, smart devices are a blessing to healthcare, producing valuable data that fuels healthy lifestyles and improves patient care. On the other hand, these devices are a nightmare, overwhelming healthcare providers’ ability to protect the data and the source of the data – patients.
Bryan Kissinger Answers Your Business Minded CISO Questions
Bryan Kissinger, CISO for Trace3, recently presented “The Business Minded CISO.” Bryan’s presentation generated lots of great questions, which he graciously answered below.
What CISOs and Cat Herders Have in Common
What do CISOs and cat herders have in common? Both are good at herding cats. This may be an odd skill for a highly-skilled profession that couples technology with risk mitigation. But the CISO role is a people role first and foremost. This requires the CISO to attend lots of meetings, ask lots of questions, and provide expert counsel.
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
Sponsored Content
No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.