In many if not most enterprises, the chief information security officer reports to the chief information officer. After all, enterprises cannot function without IT, and security is a support function to safeguard data and systems. Or is it?
A problem federal agencies face in deploying effective continuous monitoring is that there's just too much guidance, former federal chief information security officer Patrick Howard says.
Many business leaders lack a clear understanding of the value of identity and access management. CISO Christopher Paidhrin offers a scenario for how to make the case for an IAM investment.
A pilot project that Pennsylvania is launching to develop single identities for residents could help reduce fraud while piggybacking on existing enterprise directory services
As security leaders continue to have a growing influence with C-suite executives and boards of directors, they need to overcome communication challenges, says IBM's David Jarvis.
Pennsylvania Chief Information Security Officer Erik Avakian explains how the commonwealth is using a $1.1 million federal grant to pilot a program to furnish single identities to residents who transact state business over the Internet.
IT security leaders need to develop a strong, holistic security and risk management strategy as they implement advanced, strategic technical capabilities, IBM's David Jarvis says in analyzing new survey results.
What's it take to succeed as an information security leader? J.J. Thompson of Rook Consulting, Malcolm Harkins of Intel and others offer insights on the growing number of skills that are now essential.
Many chief information security officers have the business savvy and technical know-how to be their organization's chief information risk officer. But should CISOs assume that extra role?
In his four years as a top DHS cybersecurity policymaker, Bruce McConnell learned that to build trust with the public, the federal government must be more transparent in the way it approaches security and privacy.
Though others deemed Bruce McConnell as one of the government's most innovative security thought-leaders, he says his vision of how best to secure IT evolved during his just-ended 4-year tenure at DHS as a senior cybersecurity policymaker.
Phyllis Schneck, the next deputy undersecretary for cybersecurity at the Department of Homeland Security, comes to the job with a different set of experiences than her predecessors - and that could prove valuable.
What's most fascinating about the nomination of Suzanne Spaulding to be undersecretary of the Department of Homeland Security's National Protection and Programs Directorate is the fact that many of those in the know didn't realize the post was vacant.
Getting buy-in for information security spending from those who hold the purse strings can be tricky unless risks are properly assessed and articulated. See how some healthcare security leaders tackle the budget challenge.
Healthcare CIOs need to take a clear leadership role on privacy and security matters, including compliance with the HIPAA Omnibus Rule, says Russ Branzell, the new head of CHIME, a CIO association.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.asia, you agree to our use of cookies.