Cybersecurity Leadership
21.0K views | +1 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

Cybersecurity at a crossroads: Time to shift to an architectural approach

Cybersecurity at a crossroads: Time to shift to an architectural approach | Cybersecurity Leadership | Scoop.it
The need for greater scale, intelligence, and automation is driving massive change in security operations and the SIEM market.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Hacking the Human Mind: Exploiting Vulnerabilities in the 'First Line of Cyber Defense'

Hacking the Human Mind: Exploiting Vulnerabilities in the 'First Line of Cyber Defense' | Cybersecurity Leadership | Scoop.it

Understanding what defines our humanity, recognizing how our qualities can be perceived as vulnerabilities, and comprehending how our minds can be targeted provide the foundation for identifying and responding when we inevitably become the target.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The strong link between cyber threat intelligence and digital risk protection

The strong link between cyber threat intelligence and digital risk protection | Cybersecurity Leadership | Scoop.it
Digital transformation initiatives and hybrid IT increases risk and drives the need for digital risk protection. Threat intelligence programs must accommodate this requirement.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cybersecurity Budgets Are Going Up. So Why Aren't Breaches Going Down?

Cybersecurity Budgets Are Going Up. So Why Aren't Breaches Going Down? | Cybersecurity Leadership | Scoop.it

It's easy to assume that the solution to the cybersecurity problem is money– to hire more security experts, to invest in more tools and technology. If only it were that simple.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Better cybersecurity means finding the “unknown unknowns”

Better cybersecurity means finding the “unknown unknowns” | Cybersecurity Leadership | Scoop.it

Computing today is a complex and expansive web of hardware, software, and cloud services—so vast that many businesses don’t know what they’re running where. That’s a big problem.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Are You Ready to Protect Your Company From Insider Threats? Probably Not

Are You Ready to Protect Your Company From Insider Threats? Probably Not | Cybersecurity Leadership | Scoop.it
The bad news is insider threats are on the rise. The worse news is that most companies are unprepared to meet the moment.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Insiders and outsiders: Why cybersecurity strategies need to look all ways

Insiders and outsiders: Why cybersecurity strategies need to look all ways | Cybersecurity Leadership | Scoop.it

Comprehensive visibility, employee awareness, proactive threat hunting and actionable threat intelligence are indispensable pillars of a robust cybersecurity strategy and just a few areas that organizations should keep in mind as they build their cybersecurity resilience

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Five Steps to Effective Cyber Threat Intelligence

Five Steps to Effective Cyber Threat Intelligence | Cybersecurity Leadership | Scoop.it
Businesses are struggling to find the right combination of people, processes and tools to generate, consume and act upon the threat intelligence information that’s available to them.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Insider Threat Awareness - one click is all it takes….

Insider Threat Awareness - one click is all it takes…. | Cybersecurity Leadership | Scoop.it

Organisations need to have a comprehensive security program in place that focuses on both preparedness and visibility.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

How to Structure an Enterprise-Wide Threat Intelligence Strategy

How to Structure an Enterprise-Wide Threat Intelligence Strategy | Cybersecurity Leadership | Scoop.it
To keep an organization safe, you must think about the entire IT ecosystem.
No comment yet.