This final episode of the “CISO’s Guide to Obtaining Budget” podcast series focuses on how CISOs can add security components to CAPEX projects, effectively positioning themselves “upstream” of security needs. Understanding where and when to insert security initiatives into larger projects is a common denominator of success for many security leaders.
This episode of the “CISO’s Guide to Obtaining Budget” podcast series details how a CISO should build his or her reputation over time and absent of any major demands. Key recommendations include setting up a regular cadence of meetings with relevant executives to discuss business issues and managing security training exercises to demonstrate your expertise and understanding of business risks.
The typical CISO likely differs in significant ways from other business executives, perhaps in education, experience and also primary job responsibilities. So how do security leaders learn to speak the same language as their C-suite colleagues?
This episode of the “CISO’s Guide to Obtaining Budget” podcast series offers advice for CISOs and security leaders looking to bridge the gap and communicate more effectively and meaningfully with other executives. Listen now to learn how successful security leaders translate abstract technical issues into straightforward risks that any executive can understand and take action on.
This first episode of the “CISO’s Guide to Obtaining Budget” podcast series focuses on how organizations make decisions involving cybersecurity spending in a world where resource constraints are a near constant.
On Dec. 31, we’ll close the books on a year that will go down in history — not due to world events, scientific discoveries or pop culture happenings, but because of the record numbers of personally identifiable information (PII) exposed through major data breaches and cybersecurity events that happened throughout the year.
Watson is here to help you secure your enterprise.
Watson for cyber security can draw security intelligence from millions of security blogs, online forums and white papers — so you can see threats unseen by other systems .
Last year, the Mirai botnet wreaked havoc, using compromised Internet of Things (IoT) devices to take down large internet providers in North America and Europe with a distributed denial-of-service (DDoS) attack. While Mirai has largely faded from view, Bleeping Computer reported that a new threat named IoT_Reaper is exploiting specific IoT security flaws and has already infected more than 2 million devices worldwide.
Board directors are under a lot of pressure. They know that it’s only a matter of time before their organization suffers a cyber incident, and all eyes will naturally be on the directors themselves to see if they were properly exercising their risk oversight.
Could you be getting more value from your IBM Security Solution? Your local user group offers a chance to meet up with your peers working with the same technology. Even without diving into the (often confidential) details of your current project, bouncing ideas around with people having a different viewpoint can be valuable. Such discussions can give you a fresh perspective, new ideas and increased motivation. Join us to hear tips from our experts, network with other customers and share best practices for security.