No Results Found
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
What doesn’t kill you makes you stronger. No pain, no gain. If it was easy, everyone would do it. While these inspirational quotes are cliché to some, they are conventional wisdom to others. Just ask a Navy SEAL. They have highly specialized skills and are tasked with using them in high stress, high risk environments.
Unless you’ve been living under a rock, you’ve seen the damage forest fires have wreaked upon landscapes and communities in recent years. When a forest fire moves at the speed of 80 football fields per minute, fire fighters are powerless to contain the blaze. Unfortunately, CISOs can relate. Once a file containing malicious code is opened, malware can spread like wildfire throughout an organization’s network, taking down systems and bringing business operations to a grinding halt.
A business continuity plan (BCP) ensures organizations continue operating in the event of an interruption like a hurricane, earthquake or fire. Like the old saying goes, “failing to plan is planning to fail.” Few businesses however anticipated a global pandemic like COVID-19. Despite the increase in remote work over the last decade, even the most comprehensive BCPs were stress tested against the sudden shift from the corporate office to the home office, couch, or dining room table.
Can you blame the CISO who wants to quash any tool, system, or process that invites risk into the organization? CISOs face embarrassing data breaches and unceremonious terminations when employees connect unauthorized devices and applications to the network, leave unlocked computers unattended, or engage in other risky behavior.
Compliance checklists and attestations only go so far in mitigating cyber risk. They demonstrate a partner’s commitment to cybersecurity awareness however they only capture a snapshot in time. A vendor, contractor or supplier is just one connected device or phishing email away from a security incident. That vulnerability puts your partners, and ultimately you, at risk.
If you ask a CISO this question, you’re likely to get a consistent answer – probably the CEO, COO, or Board of Directors. The reality, however, is quite different. In fact, a CISO’s position on an org chart varies widely.
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.
The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.