Digital Transformation vs. Organisational Legacy The hybrid role of the CISO Beyond the functional distinctions we analysed in our reporting line article (CISO as a Figurehead / CISO as a Fire Fighter
Get Started for FREE
Sign up with Facebook Sign up with X
I don't have a Facebook or a X account
![]() ![]()
![]() Digital Transformation vs. Organisational Legacy The hybrid role of the CISO Beyond the functional distinctions we analysed in our reporting line article (CISO as a Figurehead / CISO as a Fire Fighter No comment yet.
Sign up to comment
![]() In recent years, the topic of digital transformation has moved to the top of the agenda in the business world. However, most of these discussions all too often seem to bypass the issue of cyber secur…
![]() Why is the reporting line of the CISO still a hot topic amongst Security communities? The actual role of the CISO varies greatly from one organisation to another – even if, on paper, job descri…
![]() Businesses across the world are facing considerable threats from hackers and cyber criminals, but should CIOs be held responsible for fighting them off?
![]() The latest research on corporate cybersecurity from RedSeal finds lapses in U.S. firms' approach and evidence firms are “naive” about their security measures.
![]() Software developers and computer-makers do not necessarily suffer when their products go wrong
![]() Cyber threats have become increasingly salient for most organizations, it's important to have a serious plan in place to deal with attacks as they happen.
![]() From a cyber security perspective, 2015's headlines were dominated by a number of high profile data breaches: Sony, Ashley Madison, TalkTalk
![]() Most C-suite leaders think about cybersecurity as a way to stop threats. But in today’s intensely competitive digital economy they should be thinking about cybersecurity as a strategic advantage that not only protects business value, but enables new business value.
![]() Organizations are spending more on cybersecurity, but the current approach isn't working. Here's what the new paradigm could look like. |
![]() Cyber Security Transformation is not about implementing yet another technology product Anybody who has spent a few years in InfoSec management has seen this happen: Following an internal near-miss or…
![]() 7 real-life tips for cyber security practitioners and senior executives who want to look beyond technical “box-checking” approaches Cyber security assessments can be conducted for a variety of re…
![]() When the media discusses cyber security it is often quick to jump to familiar conclusions, but we need to be looking at it in detail to fix its current issues
![]() In several articles last year, we have explored how to organise InfoSec for success and how to best establish the reporting line of the CISO. Our view – built on years of direct field experience – is
![]() Many organizations focus on technology to solve their security woes, while desperately trying to hire more security practitioners. But there are other ways to address social cybersecurity challenges. This article discusses the recent report from the Commission on Enhancing National Cybersecurity and NIST. Training, education and other workforce improvements will help, but focus must be maintained for policy, metrics, legal issues and other risk management tools.
![]() Year after year, major surveys highlight low levels of cyber security maturity across large firms, and increasingly an even more worrying situation amongst smaller firms. The 2016 RSA Cyber Poverty index is a good example of that trend. It truly paints a grim picture, but simply confirms findings that seem consistent across all large surveys... Read more »
![]() Many cybersecurity executives indicate that information protection may not be the strategic corporate imperative that it should be.
![]() Headlines only highlight the growing sophistication of hackers and introduce readers to terms like “botnet” and “Internet of Things” often without the proper context.
![]() Incoming CIOs should not be scared to launch into a cyber security transformation programme at early stages of their tenure if they see a need.
JC Gaillard's insight:
Share your insight
|