44 Posts

Scott Koegler

Freelance Writer and Former CIO

Scott Koegler practiced IT as a CIO for 15 years. He also has more than 20 years experience as a technology journalist covering topics ranging from software and services through business strategy. Scott publishes ec-bp.com, a supply chain industry newsletter and has written for publications including Network Computing, Forbes, Internet Evolution, and many others.

Written By Scott Koegler

The New CISO: Management Through Thought Leadership

The CISO can positively impact both organizational security and his or her own professional brand through thought leadership.

The Security Leader’s Expanding Role: Seven Priorities to Drive CISO Success

Today's CISO needs to be more than just a security leader. The role now demands constant communication, continuous education and acute business sense.

The Five Most Critical Tasks in the CISO Job Description

Critical elements of the CISO job description are often overlooked, exposing enterprise data and individual employees to cyberthreats.

It’s Up to Employers to Close the Cybersecurity Skills Gap

When recruiting talent to close the cybersecurity skills gap, employers must demonstrate their commitment to security research, education and knowledge.

Cybercrime Awareness Should Be Fun

Cybercrime awareness training is too crucial to be glossed over during onboarding or quickly rehashed at the end of the year.

Employee Education Is the Key to Enhanced Protection for Energy Companies

The U.S. energy infrastructure requires enhanced protection, and CISOs must educate their employees about security risks to those critical assets.

Connecting Fintech Security Perceptions to Reality

The state of fintech security will fluctuate based on the industry's ability to maintain regulatory compliance and stay abreast of cybercrime trends.

How Hotel Cybersecurity Keeps Guests and Data Secure

Hotel cybersecurity is not just about protecting financial data — it extends to guests' physical and digital property, vulnerable endpoints and more.

Execute Your IoT Deployment by the Book

More connected devices means a larger threat surface. That's why it's critical to prioritize security when designing your IoT deployment.

Five Ways Enterprises Can Close the Cybersecurity Skills Gap

To reduce the effects of the cybersecurity skills gap, organizations should ditch traditional recruiting methods and think outside the box.