Cybersecurity Leadership
20.9K views | +0 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

Today’s Enterprises Have A Complexity Problem: Their Profits, Productivity And Security Depend On Solving It

Today’s Enterprises Have A Complexity Problem: Their Profits, Productivity And Security Depend On Solving It | Cybersecurity Leadership | Scoop.it

Modern enterprises need to consider the consequences of increasing complexity as a result of maintaining so many layers of their tech stack. .

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Enterprises challenged with security basics

Enterprises challenged with security basics | Cybersecurity Leadership | Scoop.it
Visibility, security tool overload and manual reporting are cited as top concerns by UK security leaders, a report reveals
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Defining Business-Driven Security™ for the Modern Enterprise

Defining Business-Driven Security™ for the Modern Enterprise | Cybersecurity Leadership | Scoop.it

As I travel around the world and meet with CISOs and security teams, I continue to be amazed at the organizational disconnects around managing cyber risk.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The approach to risk-based cybersecurity

The approach to risk-based cybersecurity | Cybersecurity Leadership | Scoop.it
The most sophisticated institutions are moving from maturity-based to risk-based cybersecurity. Here is how they are doing it.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

What is cyber resilience? Building cybersecurity shock absorbers for the enterprise

What is cyber resilience? Building cybersecurity shock absorbers for the enterprise | Cybersecurity Leadership | Scoop.it
Sure, you’ve prepared for attacks and breaches, but how well can core business processes function when a crisis hits?
No comment yet.