Critical elements of the CISO job description are often overlooked, exposing enterprise data and individual employees to cyberthreats.
Just like security analysts, top executives need data breach training to develop the skills required to carry out an effective incident response strategy.
To ensure a smooth transfer of security power, organizations should establish a definitive plan to appoint and develop a deputy CISO.
Security leaders must translate their technical expertise into business insights when communicating cyber risks to executives and board directors.
Effective change management requires thorough planning, constant communication, and strong leadership capable of swaying the organizational culture.
To address security gaps in the energy industry, organizations must empower leaders to take full responsibility for cyberdefense and hold them accountable.
IBM Security had nine entries short-listed for this year's SC Europe Awards. Over time, we've seen the number of IBM entries short-listed increase.
With so much disinformation being reported in the news and spread through social media, it's hard for security professionals to know what to believe.
OODA loops can help System 1-thinking security professionals react swiftly to cyberattacks and embrace an intuitive approach to incident response.
Health care initiatives such as the campaign to encourage proper hand-washing can serve as blueprints for CISOs seeking to drive security awareness.