Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

CISO Insights

Elevating Security Through Cross-Sector Information Sharing & Collaboration

Gary Coverdale

Assistant CIO and CISO

Napa County

CISO InsightsBy Gary CoverdaleJanuary 18, 2016

The security landscape is ever evolving and with each new threat comes an even stronger need to work together as an industry in order to elevate information security and stay…

Details

Making Insurance Part of Your Enterprise Risk Management Program – Part One

Grace Crickette

Vice Chancellor for Administrative Affairs

University of Wisconsin-Whitewater

CISO InsightsBy Grace CricketteJanuary 13, 2016

In this series, Grace Crickette provides C-Level excutives a comprehensive overview of cyber insurance, while addressing business impacts and offering best practices for implementing a risk-management strategy that includes a cyber-liability…

Details

An Assessment of the Framework for Improving Critical Infrastructure Cybersecurity – Part 3

Brian Lozada

CISO

Zocdoc

CISO InsightsBy Brian LozadaJanuary 12, 2016

In this five-part series CISO Brian Lozada examines the state of cybersecurity in our nation’s critical infrastructure, what is at risk, what makes it unique and what measures can be…

Details

The Sanders-Clinton Data Brouhaha: It is Not About Privacy and All About Identity

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerJanuary 11, 2016

In August of 2010, Huping Zhou who had served as a researcher at the UCLA School of Medicine and had since been terminated, was sentenced to jail time for inappropriately…

Details

Innovating as a CISO: Changing the Conversation

Devon Bryan

CISO

The Federal Reserve System

CISO InsightsBy Devon BryanJanuary 7, 2016

I recently sat on a panel with fellow security executives to discuss the general topic of innovating as a CISO. Unsurprising and somewhat understandable, the conversation quickly devolved and topics…

Details

Push Beyond Political Rhetoric in the Backdoor Encryption Debate

Greg Schaffer

CEO, Previously VP of Information Security

vCISO Services, Formerly of FirstBank

CISO InsightsBy Greg SchafferJanuary 6, 2016

The old year is over, the new one has begun, and that means information security predictions galore! From my very unscientific perusal of many of those, incident response, cyber insurance,…

Details

Three Things to Consider in 2016

John Masserini

CISO

Millicom (Tigo) Telecommunications

CISO InsightsBy John MasseriniJanuary 4, 2016

During a bit of down time this holiday season, I had an opportunity to catch up on a lot of my fellow security pundits’ predictions for 2016. Not surprisingly, there…

Details

An Assessment of the Framework for Improving Critical Infrastructure Cybersecurity – Part 2

Brian Lozada

CISO

Zocdoc

CISO InsightsBy Brian LozadaDecember 28, 2015

In this five-part series CISO Brian Lozada examines the state of cybersecurity in our nation’s critical infrastructure, what is at risk, what makes it unique and what measures can be…

Details

A CISO’s Tips for a Fraud-Free Holiday Season

Gene Fredriksen

CISO

PSCU

CISO InsightsBy Gene FredriksenDecember 21, 2015

While the holiday season traditionally brings consumers words of warning about an increased risk of fraud, vigilance on the part of credit unions and consumers can go a long way…

Details

25 CISOs Identify the Biggest Security Challenges as They Enter 2016

Security Current

CISO InsightsBy Security CurrentDecember 20, 2015

As the year winds to a close, CISOs across industries assess the past year and plan for the security challenges they will face as they head into 2016. Security Current…

Details

An Assessment of the Framework for Improving Critical Infrastructure Cybersecurity

Brian Lozada

CISO

Zocdoc

CISO InsightsBy Brian LozadaDecember 19, 2015

In this five-part series CISO Brian Lozada examines the state of cybersecurity in our nation’s critical infrastructure, what is at risk, what makes it unique and what measures can be…

Details

Facts, Tips, and References for CISOs this Holiday Season

Farhaad Nero

VP

Enterprise Security Bank of Tokyo-Mitsubishi

CISO InsightsBy Farhaad NeroDecember 17, 2015

Well, ‘tis the season – a season for celebrating and a season for shopping. You are the CISO, the head honcho for everything information security. So who’re you gonna call…

Details
←1234567891011121314151617181920→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}