Remove Groups Remove Organization Remove Programming Remove Security
article thumbnail

Need a security road map? Ditch the ad hoc measurement

CIO

CISOs can only know the performance and maturity of their security program by actively measuring it themselves; after all, to measure is to know. However, CISOs aren’t typically measuring their security program proactively or methodically to understand their current security program.

Metrics 274
article thumbnail

6 IT leadership organizations CIOs should consider joining

CIO

Joining an IT leadership organization CIOs not only establish friendly relationships with other tech leaders but also gain valuable insights on the latest IT, business, and leadership trends. By making connections, CIOs can continuously add value to their organization and their career by learning from colleagues and peers.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Solving the tech debt problem while staying competitive and secure

CIO

Looking ahead to the next 12-18 months, two top priorities emerge for IT leaders: developing a strong business case for AI infrastructure spending (cited by 35% of respondents to IDC’s Future Enterprise Resiliency and Spending Survey, Wave 3 , March 2024) and increasing cyber resilience and security (34%).

Security 246
article thumbnail

Aligning security and business strategies

CIO

By Sean Duca, vice president and regional chief security officer for Asia Pacific and Japan at Palo Alto Networks Some economists predict that we could soon face a global recession. This can be a challenge to cyber budgets in organizations where security is viewed primarily as a cost center.

Security 261
article thumbnail

Differentiating people, process, and technology problems: A guide for CISOs

CIO

When it comes to security, knowing you have a problem is only half the battle – if that. Is it a people issue, such as lack of enough security personnel? Is it inefficient processes that hamper communication within security teams? Is it inefficient processes that hamper communication within security teams?

article thumbnail

Cybersecurity Snapshot: NIST Program Assesses How AI Systems Will Behave in the Real World, While FBI Has Troves of Decryption Keys for LockBit Victims

Tenable

Check out the new ARIA program from NIST, designed to evaluate if an AI system will be safe and fair once it’s launched. In addition, Deloitte finds that boosting cybersecurity is key for generative AI deployment success. And why identity security is getting harder. government has launched an AI testing and evaluation program.

article thumbnail

Creating a Security Program with Less Complexity and More Visibility

Palo Alto Networks

Developing a strong security program is like tending a garden. Organized cybercriminals build teams that specialize in different phases of attack, from intelligence gathering to exfiltration. The greatest misconception about cybersecurity is that programs can catch up overnight with silver-bullet solutions.