Art Coviello, a partner at Rally Ventures and former CEO of RSA, recently met with a group of CISOs on the topic of presenting to the board. He was surprised - and not in a good way - at what he heard. Here are his tips for talking cybersecurity with senior business leaders.
In a crowded cybersecurity marketplace, it's challenging for newcomers not only to get funding, but also to rise above the noise and get attention. This is where venture capital firms can help, says Don Dixon, co-founder and managing director of ForgePoint Capital.
CISO stress levels are higher this year than last. What is the impact on these individuals and their enterprises? And what should be done to alleviate this stress? Stuart Reed of Nominet analyzes the latest CISO Stress report.
In an RSA 2020 conference keynote, Cisco's Wendy Nather spoke of "democratizing security" - thinking differently about the people we serve and secure. She expands on that theme and discusses her role as head of advisory CISOs at Cisco's Duo Security unit.
What are enterprises seeking in their next CISO - a technologist, a business leader or both? Joyce Brocaglia of Alta Associates shares insights on the key qualities she's looking for when recruiting CISOs.
Ex-federal CISO Gregory Touhill, a retired general, understands the global staffing crunch. Now, as president of AppGate Federal and as a board member for ISACA, he shares new insights on how to tackle cybersecurity recruiting and retention.
You know you need a third-party cyber risk management (TPCRM) solution. Learn how to assess your current program maturity, key considerations for selecting technology, and how to make your case to the c-suite.
Download this guide to better understand the options for TPCRM, whether you are looking to advance your...
Increased business reliance on vendors and third parties means attack surfaces are growing. With greater attack surfaces comes greater risk, and thus the need for an effective third-party cyber risk management program.
Download this guide to learn how to get buy-in from key stakeholders, common roadblocks, and more.
Very few healthcare Infosec teams have the time and resources to deal with the formidable security challenges that they face.
Join Gigamon and register for this webinar to learn ways to save time and resources while improving your security posture by:
Optimizing tool and team efficiency by filtering out irrelevant...
Are you attending the RSA 2020 conference? To help navigate the show, here's a preview of 12 top keynote sessions featuring some of the biggest names in cybersecurity tackling critical subjects, including cryptography, critical infrastructure security, bug bounties and supply chain risks.
You already have some sort of third party security program in place - perhaps you've built a security questionnaire based on internal policies or an industry standard such as ISO or NIST. You may have even "right-sized" your questionnaire specifically for different types of supplier relationships and developed a few...
Information Security Media Group, a premier media partner at the annual RSA Conference, will conduct over 200 video interviews at this year's event with cybersecurity thought leaders, executives, CISOs and sponsors.
If your organization does software development in-house, there are a myriad of development workflows and processes to choose from. Some organizations still implement old-school waterfall development workflows; some are agile shops. In terms of process, some have adopted DevOps, and some integrate security testing into...