CISOs Tackle Compliance with Cyber Guidelines

The more information chief information security officers can uncover about their security and tech stack, the better off they will be.

CISOs Tackle Compliance With Cyber Guidelines (informationweek.com)

Cyber Insurance Strategy Requires CISO-CFO Collaboration

Cyber-risk quantification brings together the CISO’s technical expertise and the CFO’s focus on financial impact to develop a stronger and better understanding of what’s at stake.

Cyber Insurance Strategy Requires CISO-CFO Collaboration (darkreading.com)

How New SEC Disclosures Are Shaking up This Year’s Responsibilities

As cybersecurity teams adjust to the government’s latest directives, security leaders must prepare and ensure compliance with these new regulations.

How New SEC Disclosures Are Shaking up This Year’s Responsibilities – CPO Magazine

What’s behind the demand for MDR and IAM systems

It’s not just the front door businesses need to protect. Organizations also have to recognize the damage threat actors can do once they’re inside.

What’s behind the demand for MDR and IAM systems | Cybersecurity Dive

DNS tunneling: How it’s evolved and four ways to reduce the risk

DNS tunneling was cited as the second-biggest concern organizations had when it came to the security of their DNS infrastructure

DNS tunneling: How it’s evolved and four ways to reduce the risk | Security Magazine

What Are the Top 7 DDoS Mitigation Tactics for Energy Grids?

A well-planned DDoS attack on the grid could halt essential services, cause substantial disruptions to households and businesses, and prove incredibly costly.

What Are the Top 7 DDoS Mitigation Tactics for Energy Grids? | Tripwire

NIST Cybersecurity Framework 2.0 Reveals Major Shifts in Federal Guidance

Risk governance and supply chain risk management comprise the most significant changes from Cyber Security Framework 1.1 to 2.0

NIST Cybersecurity Framework 2.0 Reveals Major Shifts in Federal Guidance: Wiley (wileyconnect.com)

From federation to fabric: IAM’s evolution

It’s time to learn from the past, evaluate the present and, of course, prepare for the future of IAM.

From federation to fabric: IAM’s evolution (securityintelligence.com)

Navigating Cybersecurity in the Era of Mergers

By addressing visibility gaps, learning from past M&A cybersecurity incidents, implementing standardized protocols and navigating internal politics, organizations can establish a robust defense against evolving cyber threats.

Navigating Cybersecurity In The Era Of Mergers (forbes.com)

30 years of the CISO role – how things have changed since Steve Katz

The first-ever CISO was mostly a technically oriented executive. They’ve since evolved into masters of risk management, threat mitigation, regulatory compliance, data privacy, and much more.

30 years of the CISO role – how things have changed since Steve Katz | CSO Online

Share: