Cybersecurity Leadership
21.0K views | +1 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

Cybersecurity at a crossroads: Time to shift to an architectural approach

Cybersecurity at a crossroads: Time to shift to an architectural approach | Cybersecurity Leadership | Scoop.it
The need for greater scale, intelligence, and automation is driving massive change in security operations and the SIEM market.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The Ethics of Network and Security Monitoring

The Ethics of Network and Security Monitoring | Cybersecurity Leadership | Scoop.it
The chances of getting hacked are no longer low. Companies need to rethink their data collection and monitoring strategies to protect employee privacy and corporate integrity.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

5 Signs You Should Re-Evaluate Your Relationship with Your MSSP

5 Signs You Should Re-Evaluate Your Relationship with Your MSSP | Cybersecurity Leadership | Scoop.it

How do you know your MSSP, managed security service provider, can be trusted and is offering higher value security services that extend beyond simple monitoring and analysis?

No comment yet.
Scooped by JC Gaillard
Scoop.it!

What's On the Horizon for SIEM Technology? Five Upcoming Innovations in Security Analytics

What's On the Horizon for SIEM Technology? Five Upcoming Innovations in Security Analytics | Cybersecurity Leadership | Scoop.it
As cloud adoption increases, the IT skills gap widens and the threat landscape becomes more sophisticated, innovations in SIEM technology will revolutionize the way SOCs perform security analytics.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Reliance on Self-Attestation is not Working for the Cyber Insurance Industry

Reliance on Self-Attestation is not Working for the Cyber Insurance Industry | Cybersecurity Leadership | Scoop.it

IT environments are simply too complex and too dynamic for self-attestation, based on manual processes, to ever work. Without continuous monitoring to accurately assess compliance to cyber insurance requirements, organizations remain at risk.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

40% of enterprises don't include business-critical systems in their cybersecurity monitoring

40% of enterprises don't include business-critical systems in their cybersecurity monitoring | Cybersecurity Leadership | Scoop.it
40 per cent of enterprises do not include business-critical systems such as SAP in their cybersecurity monitoring.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

How to achieve security observability in complex environments

How to achieve security observability in complex environments | Cybersecurity Leadership | Scoop.it
As cyber attacks evolve, so must infosec teams' methods of detecting them. Security observability is the next step up from monitoring. Learn why, as well as when to build or retrofit this approach into complex enterprise environments.
No comment yet.