All Posts (2678)

Sort by

8669835676?profile=original

A free-flowing discussion about the past and future evolution of cybersecurity leadership.  I had a great time sharing my personal experiences, industry insights, and a few rants in this podcast interview with Marco Ciappelli and Sean Martin of ITSP

Read more…

[Webinar] Ransomware And Email Security

This webinar will provide a detail of Ransomware, it’s effect and preventive measures.


Key Takeaways:

o How we can be protected from Ransomware attacks.

o What are the best practices, which can be followed to prevent Ransomware attacks.

About Speake

Read more…
Views: 241
Comments: 0

Connected Device Security: A Growing Threat

[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services Information Security Media Group (ISMG) ]

Many cybersecurity analysts have warned of the rapidly emerging threat from an expanded IoT space. And as you have noticed, it appea

Read more…
Views: 57
Comments: 0

IT And Knowledge Creation

[Posted on behalf Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author | University of Tennessee health science center]

IT and Knowledge Creation

This article focuses on the effective use of information technology

Read more…
Views: 104
Comments: 0

Security Predictions for 2020

[Posted on behalf of Steve King, Director, Cybersecurity Advisory Services  Information Security Media Group (ISMG) ] (source)
By now, you’ve been inundated with security predictions from all the major vendors and talking heads. I won’t repeat what a
Read more…
Views: 98
Comments: 0

Innovation & Growth

[Posted on Behalf of Subbu Iyer, Founder and chief Designer Hreemm]

The Process of Innovation
Globally the understanding of the Process of Innovation has been driven as a populist understanding of Ideas Management. That probably worked when the rate

Read more…
Views: 41
Comments: 0

[Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services Information Security Media Group (ISMG)]

A recent McKinsey survey tells us that damaging cyberattacks and an onslaught of suspicious digital communications have made cybersecu

Read more…
Views: 52
Comments: 0

[Posted on behalf of Dan Lohrmann, Chief Strategist & Chief Security Officer Security mentor, Inc.]

 
Whether you call them cybersecurity forecasts, online risk trends or security predictions, here’s a roundup of what our top security companies, indu
Read more…
Views: 62
Comments: 0

How CISOs Build Their Road Map

[Posted on behalf of Gary Hayslip,  CISO Softbank Investment advisor ]

 
Recently, I addressed a group of security professionals, and our discussion was on how CISOs develop their strategy. I found many in the audience had no idea how security execut
Read more…
Views: 20
Comments: 0

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership