Cybersecurity Leadership
24.5K views | +0 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
April 22, 2017 2:46 AM
Scoop.it!

Cybersecurity: The Only Constant is Change

Cybersecurity: The Only Constant is Change | Cybersecurity Leadership | Scoop.it
Every day, the digital infrastructure is targeted with new cyberthreats – including advanced hacks, phishing or even DDoS. The only true constant is change.
No comment yet.
Scooped by JC Gaillard
April 21, 2017 2:20 AM
Scoop.it!

Cyber risk issues resonating in boardrooms

Cyber risk issues resonating in boardrooms | Cybersecurity Leadership | Scoop.it
The Cyentia Institute used surveys and interviews with corporate board members and CISOs to identify specific cyber risk issues resonating in boardrooms.
No comment yet.
Scooped by JC Gaillard
April 20, 2017 2:50 AM
Scoop.it!

GRC: The “Three Lines of Defence” model only works on Trust

GRC: The “Three Lines of Defence” model only works on Trust | Cybersecurity Leadership | Scoop.it
Hybrid operating models can work and bring value around GRC but as long as the dynamics of trust and efficiency are preserved.
No comment yet.
Scooped by JC Gaillard
April 19, 2017 2:08 AM
Scoop.it!

Internet of Things Will Change Cyber Security Forever

Internet of Things Will Change Cyber Security Forever | Cybersecurity Leadership | Scoop.it
Over 20 percent of enterprises will have digital security services devoted to protecting business initiatives using devices and services in the Internet of Things by year end 2017, , report, iot, internet of things, gartner, cyber security, CISOs, Chief Information Security Officer, byod
No comment yet.
Scooped by JC Gaillard
April 17, 2017 2:42 AM
Scoop.it!

Build a SOC or Choose an MSSP?

Build a SOC or Choose an MSSP? | Cybersecurity Leadership | Scoop.it
The decision to build an internal Security Operations Center (SOC) versus selecting a Managed Security Service Provider (MSSP) to handle operational information security concerns can be a difficult and time consuming task for organizations seeking to improve their security posture. This post will explore advantages and disadvantages of both options and provide context around my personal experience with helping build a SOC and select an MSSP.
No comment yet.
Scooped by JC Gaillard
April 16, 2017 2:26 AM
Scoop.it!

Debunking the 5 Myths of Sophisticated Cyber Attacks

Debunking the 5 Myths of Sophisticated Cyber Attacks | Cybersecurity Leadership | Scoop.it
Cyber-attacks can originate from anywhere, but there appears to be an unabated trend of pointing the finger on either "sophisticated attackers" or, more blatantly, naming and blaming nation-states like China and Russia (alright, maybe North Korea and Iran). The truth about attribution (who is the attacker) is often overlooked for something more dramatic, especially in situations where sensitive information or brand reputation is at risk.  Specifically, we see businesses often try to save face by blaming attacks on state actors when they failed to make . . .
No comment yet.
Scooped by JC Gaillard
April 15, 2017 2:02 AM
Scoop.it!

Shifting gears in cybersecurity for connected cars

Shifting gears in cybersecurity for connected cars | Cybersecurity Leadership | Scoop.it
To secure products across the supply chain, the automotive sector must develop new ways to collaborate.
No comment yet.
Scooped by JC Gaillard
April 13, 2017 2:38 AM
Scoop.it!

How you can be the smartest cybersecurity expert in the room

How you can be the smartest cybersecurity expert in the room | Cybersecurity Leadership | Scoop.it
Every 10 years, something comes along in the world of IT that is so big, so important, that shrewd people build wildly successful careers on just that one
No comment yet.
Scooped by JC Gaillard
April 12, 2017 2:08 AM
Scoop.it!

Almost Half of UK Firms Lack a Formal Security Strategy

Almost Half of UK Firms Lack a Formal Security Strategy | Cybersecurity Leadership | Scoop.it
Most executives recognize the growing threat posed by cyberattacks, but few are putting the security strategy in place to help keep information safe.
No comment yet.
Scooped by JC Gaillard
April 12, 2017 2:02 AM
Scoop.it!

A truly strategic approach to security has never been more business critical

A truly strategic approach to security has never been more business critical | Cybersecurity Leadership | Scoop.it
Organisations must make sure they have the right strategy in place for device and person-based identity and access management.
No comment yet.
Scooped by JC Gaillard
April 11, 2017 2:02 AM
Scoop.it!

Cyber Resilience Tools and Principles for Boards

Cyber Resilience Tools and Principles for Boards | Cybersecurity Leadership | Scoop.it
Cyber resilience is a full-board issue, not just an IT problem. A new WEF report outlines 10 principles to help boards get on board with resilience efforts
No comment yet.
Scooped by JC Gaillard
April 10, 2017 1:59 AM
Scoop.it!

The Hidden Problem with Easy Cybercrime

The Hidden Problem with Easy Cybercrime | Cybersecurity Leadership | Scoop.it
Cybercriminals using Ransomware-as-a-Service (RaaS) can now easily start an illegal online enterprise targeting victims all over the globe.
No comment yet.
Scooped by JC Gaillard
April 9, 2017 2:06 AM
Scoop.it!

The Human Point Of Cyber Security

The Human Point Of Cyber Security | Cybersecurity Leadership | Scoop.it
How do we deal with the human element of cyber security without losing our souls?
No comment yet.
Scooped by JC Gaillard
April 21, 2017 2:22 AM
Scoop.it!

CISOs and Boards of Directors Are Far Apart (But Can Close the Gap), New Survey Says

CISOs and Boards of Directors Are Far Apart (But Can Close the Gap), New Survey Says | Cybersecurity Leadership | Scoop.it
Improve communication between chief information security officers and boards of directors: 5 big gaps and 10 recommendations in the Cyber Balance Sheet survey.
No comment yet.
Scooped by JC Gaillard
April 21, 2017 2:15 AM
Scoop.it!

Why everything is hackable: Computer security is broken from top to bottom

Why everything is hackable: Computer security is broken from top to bottom | Cybersecurity Leadership | Scoop.it
OVER a couple of days in February, hundreds of thousands of point-of-sale printers in restaurants around the world began behaving strangely. Some churned out bizarre pictures of computers and giant robots signed, “with love from the hacker God himself”. Some informed their owners that, “YOUR PRINTER HAS BEEN PWND’D”.
No comment yet.
Scooped by JC Gaillard
April 20, 2017 2:45 AM
Scoop.it!

Why Your Entire Workforce Needs to Be Part of Your Cybersecurity Strategy

Why Your Entire Workforce Needs to Be Part of Your Cybersecurity Strategy | Cybersecurity Leadership | Scoop.it
From phishy e-mails to weak passwords, it can seem like the Internet is a minefield of cybersecurity breaches waiting to happen to you and your company. So it’s no surprise that an estimated 95 percent of cyber attacks are caused by human error. Considering the shortage of easily digestible information on how to guard companies from data breaches, employee cybersecurity training is a crucial step in turning your workforce into a strong line of defense against hackers.
No comment yet.
Scooped by JC Gaillard
April 18, 2017 1:33 AM
Scoop.it!

Why we should let our walls down when it comes to cybersecurity

Why we should let our walls down when it comes to cybersecurity | Cybersecurity Leadership | Scoop.it
OPINION | The reality is that threats are bound to find their way in, so companies must find ways to build layers and adapt.
No comment yet.
Scooped by JC Gaillard
April 16, 2017 2:39 AM
Scoop.it!

How Automakers Can Take the Lead In Cybersecurity

How Automakers Can Take the Lead In Cybersecurity | Cybersecurity Leadership | Scoop.it
The auto industry needs to drive automotive cybersecurity principles and actively protect consumer data before regulators define the rules of the road. Here are 5 tips for protecting your consumers and your company’s agenda.
No comment yet.
Scooped by JC Gaillard
April 15, 2017 2:10 AM
Scoop.it!

Comment la blockchain peut aider contre les cyberattaques?

Comment la blockchain peut aider contre les cyberattaques? | Cybersecurity Leadership | Scoop.it
La cybersécurité doit impliquer l’intelligence de l’homme dans le bon fonctionnement de la blockchain.
No comment yet.
Scooped by JC Gaillard
April 14, 2017 2:45 AM
Scoop.it!

The changing face of cyber security in a post-truth world

The changing face of cyber security in a post-truth world | Cybersecurity Leadership | Scoop.it
Post-truths are changing the face of the planet on both a macro and micro level, and human beings are the weak link in this chain
No comment yet.
Scooped by JC Gaillard
April 12, 2017 2:33 AM
Scoop.it!

The Majority Of People Are Still Confused About Cybersecurity

The Majority Of People Are Still Confused About Cybersecurity | Cybersecurity Leadership | Scoop.it
The constant drip-feed of cybersecurity scare stories has not translated into public awareness.
No comment yet.
Scooped by JC Gaillard
April 12, 2017 2:05 AM
Scoop.it!

Why the board needs security leaders to fuel disciplined growth

Why the board needs security leaders to fuel disciplined growth | Cybersecurity Leadership | Scoop.it
Peter Cohan shares insights from his career and latest book to explain the importance of security in the boardroom and what boards and security leaders need to advance their relationship
No comment yet.
Scooped by JC Gaillard
April 11, 2017 2:05 AM
Scoop.it!

Attackers thrive in a fluid market, while bureaucracy constrains defenders

Attackers thrive in a fluid market, while bureaucracy constrains defenders | Cybersecurity Leadership | Scoop.it
Cybercriminals have the advantage, thanks to the incentives for cybercrime creating a big business in a fluid and dynamic marketplace.
No comment yet.
Scooped by JC Gaillard
April 10, 2017 2:13 AM
Scoop.it!

How Do You Know You're Making Progress in Your Security Program?

How Do You Know You're Making Progress in Your Security Program? | Cybersecurity Leadership | Scoop.it
When it comes to security, only perfect practice makes perfect. Still, many IT teams rush through the motions in a mad dash to show signs of progress.
No comment yet.
Scooped by JC Gaillard
April 9, 2017 2:07 AM
Scoop.it!

Is it worth using outsourced security services instead of in-house?

Is it worth using outsourced security services instead of in-house? | Cybersecurity Leadership | Scoop.it
Outsourced security services have benefits and drawbacks for enterprises. Here's a look at the pros and cons of using MSSPs.
No comment yet.