Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

CISO Insights

A Roadmap for Women to Becoming a CISO

Vanessa Pegueros

CISO

DocuSign

CISO InsightsBy Vanessa PeguerosDecember 14, 2015

I have been in information security for 14 years and my career has progressed wonderfully.  With more than 20 years of experience managing and leading people, I have identified some…

Details

Where Do We Go From Here? The Future State of Information Security!

Roota Almeida

Head of Information Security

Delta Dental NJ

CISO InsightsBy Roota AlmeidaDecember 9, 2015

WHAT DOES THE FUTURE LOOK LIKE? CAN WE ACTUALLY PREDICT THE FUTURE? As a person who regularly makes predictions would tell us, the past is an important tool in determining what will happen…

Details

‘Tis the Season for Cybercriminals – Part Two

Anthony Scarola

VP, Cyber Security

Finance Sector

CISO InsightsBy Anthony ScarolaDecember 8, 2015

In this two-part series, CISO Anthony Scarola examines the elevated threats for both shoppers and financial institutions during the holiday season and offers best practices for ensuring your enterprise is…

Details

The Holidays and the Internet – What Could Go Wrong?

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattDecember 4, 2015

According to the internetretailer.com, holiday sales are up 15%-16% this year online, but down 4.7%-10% instore.  If I were in the identity theft business, I would have a hard time…

Details

‘Tis the Season for Cybercriminals – Part One

Anthony Scarola

VP, Cyber Security

Finance Sector

CISO InsightsBy Anthony ScarolaDecember 2, 2015

In this two-part series, CISO Anthony Scarola examines the elevated threats for both shoppers and financial institutions during the holiday season and offers best practices for ensuring your enterprise is…

Details

An Open Letter to Vendors — Part 3

John Masserini

CISO

Millicom (Tigo) Telecommunications

CISO InsightsBy John MasseriniNovember 24, 2015

In the third and final installment of my Open Letter to Vendors, we’re going to take a look the technology challenges that many vendors overlook. This isn’t about the bits…

Details

At the Privacy & Security Forum: What I Said

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerNovember 16, 2015

Focus is over-rated when you’re starting out.  The original idea for my presentation at The Privacy & Security Forum in Washington, D.C. was to talk exclusively on how security controls…

Details

IoT Security: Think Beyond Data

Pritesh Parekh

VP, CSO

Zuora

CISO InsightsBy Pritesh ParekhNovember 13, 2015

In today’s Internet of Things (IoT) world, every device can communicate and be connected to the Internet – from your refrigerator to your lights and cars. IoT’s glitter is often…

Details

An Open Letter to Vendors — Part 2

John Masserini

CISO

Millicom (Tigo) Telecommunications

CISO InsightsBy John MasseriniNovember 10, 2015

In Part I, I gave you some food for thought about getting your message out there in a clean, crisp, and concise way. In the second installment of my Open…

Details

At the Privacy & Security Forum: What I Saw

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerOctober 28, 2015

Privacy folks and security folks were finally intermingling by design and not by accident or through one or the other being adventurous.  I’m a huge proponent of the two being…

Details

Encryption: To Be Or Not to Be

Daniel Conroy

CISO

Aviation and Aerospace Sector

CISO InsightsBy Daniel ConroyOctober 15, 2015

All financial institutions and retailers are looking for solutions to protect credit card and other sensitive data from the moment the magnetic stripe of the payment card is swiped through…

Details

A CISO Checklist: How to Reduce the Silo Effect

Farhaad Nero

VP

Enterprise Security Bank of Tokyo-Mitsubishi

CISO InsightsBy Farhaad NeroOctober 1, 2015

As a CISO or an executive responsible for the Information Security organization at your company, one thing that you ought to keep in real focus is the Silo Effect. Be…

Details
←1234567891011121314151617181920→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}