Select Page

Temporary Section

Your content goes here. Edit or remove this text inline or in the module Content settings. You can also style every aspect of this content in the module Design settings and even apply custom CSS to this text in the module Advanced settings.

This Is How All CISOs Should Build a Business Case

This Is How All CISOs Should Build a Business Case

Whether you’re deciding what to wear or where to eat, having options is ideal. The same is true when it comes to presenting your business case to your CIO or Board of Directors: you’re better off if you can give them options. Present them with three options: 1) a bare-minimum, 2) centrist, and 3) best-case, no holds barred approach to your cybersecurity program or a strategic initiative. This lets them know you’ve done your homework and it puts the onus on the decision maker, not you.

CISO Street recently interviewed Bryan Kissinger, CISO for Trace3 and author of “The Business Minded CISO.” In this video, Bryan discusses the best approach for building a business case for a security program.

The Surprising Truth About Zero Trust During COVID

The Surprising Truth About Zero Trust During COVID

The concept of a zero trust architecture is fantastic, in theory. How realistic is it in a post-pandemic world? Businesses rushed to implement cloud applications at the start of the pandemic. Employees accessed those applications from shared home networks using myriad devices. Verifying a user’s identity in this current environment therefore seems challenging at best. Can an organization realistically adopt a true zero trust model, or is a ‘Trust-But-Verify’ approach more attainable?

CISO Street recently moderated a virtual CISO panel and asked panelists about their perspectives on current cyber trends and challenges. In this video, Richard Rushing, CISO for Motorola Mobility and Jeff Lush, CIO for Air University at U.S. Air Force share their thoughts on zero trust during the pandemic.

THIS Is Why There Was an Increase in Malware Clickbait

THIS Is Why There Was an Increase in Malware Clickbait

When employees started working from home so, too, did the hackers. The rampant digital transformation opened up vulnerabilities for organizations that prioritized moving to digital quickly over moving to digital securely. Many organizations saw phishing emails containing malicious Zoom links or malware disguised as COVID-19 related webpages. Hackers easily took advantage and attacked these vulnerable devices now residing outside of the organization.

Share This