The latest report from the DCRO urged top leadership to become more engaged in cyber risk governance and to hold all departments — not just IT — accountable for proper security hygiene.
As companies grow, the process of hiring IT professionals becomes increasingly tedious, putting them at risk of missing out on top talent.
Although IT leaders have traditionally struggled to gain executive buy-in for greater security budgets, recent data revealed that cyberthreat concerns are creeping closer to the top of CEOs' agendas.
When it comes to cybersecurity reporting, CISOs must communicate security risks, priorities and initiatives in the language of business to earn the attention and respect of board directors.
April's cybersecurity recap features more enterprises embracing AI and new insights into consumer perspectives on security.
As long as C-suite executives believe that cybersecurity is an IT issue, they will remain disengaged from the solutions and their role in supporting a robust cyber risk management strategy.
Social engineering dates back to ancient times. Today, the most common forms of social trickery include baiting, vishing, phishing and other schemes designed to exploit human nature.
To become an influencer within his or her organization, the security leader must effectively communicate with lines of business, engage with the board — and avoid abusing his or her veto power.
A data breach simulation is a great way to test your team's crisis response capabilities and prepare executives to deal with the aftermath of a cyberattack.
According to recent research, many companies fail to adapt their cybersecurity strategy to the shifting cybercrime landscape, even in the wake of a major data breach.