Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

CISO Insights

OPM Breach: Why Doing the Basics is Not Easy

Chris Carpenter

Director

DoD Cyber Crime Center

CISO InsightsBy Chris CarpenterJuly 10, 2015

The recent Office of Personnel Management (OPM) breach may be the largest breach of Federal records ever. With the resignation of OPM Director Katherine Archuleta over the compromise of the newly…

Details

Are We Painting Ourselves into a Technological Corner? The NYSE, United Airlines and WSJ Tech Glitches

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattJuly 8, 2015

It was a bad day for the Internet.  At some time that morning, the New York Stock Exchange (NYSE) shut down, the Wall Street Journal  (WSJ) web site broke and the United Airlines…

Details

Afterthoughts: Big Data and Us Little People

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerJuly 7, 2015

The original series was written in a frenzy.  Aggregating is the inverse of broadcasting.  Aggregation is biased towards anonymity. Being the subject of a data point is a matter of…

Details

Lawyers Gone Wild – Document Preservation Requests Are Out of Control

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattJuly 1, 2015

I don’t know how many of the readers out there have gotten to deal with the joy of document preservation, but let me tell you, it is not a lot…

Details

The Most Important Element of Information Security Success

Daniel Conroy

CISO

Aviation and Aerospace Sector

CISO InsightsBy Daniel ConroyJune 25, 2015

As a CISO, I am often asked, “What is the key component to the success of an Information Security organization?” Too often, we dwell on the failures or gaps, and…

Details

How to Turn 4 Million Into 18 Million

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattJune 23, 2015

The story about the Office of Personnel Management getting hacked this week was, unfortunately, not a big surprise to anyone in the security world.  How it got hacked, by phishing,…

Details

A CISO Checklist – 11 Tips to Get Ready for Your Much Needed Vacation

Farhaad Nero

VP

Enterprise Security Bank of Tokyo-Mitsubishi

CISO InsightsBy Farhaad NeroJune 15, 2015

Do you know how Merriam-Webster defines vacation? Believe it or not – this is what it says: – A period of time that a person spends away from home, school, or…

Details

The 20 Critical Controls – A Practical Security Strategy – Part 2

Randy Marchany

CISO

Virginia Tech

CISO InsightsBy Randy MarchanyJune 11, 2015

In my last article, I talked about using the 20 Critical Controls as a practical security strategy.  I showed how the controls map to a wide variety of international and…

Details

Who Am I?

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattJune 9, 2015

I frequently talk to myself.  I think that this is mostly OK, except when I have an argument.  The other day, I asked myself, “Who am I?” and I was…

Details

Why Did the Chicken Cross the Road? And Wearable Devices

Christine Vanderpool

CISO

Florida Crystals

CISO InsightsBy Christine VanderpoolJune 8, 2015

Why did the chicken cross the road? To add 200 more steps to his daily wearable device count! But did the chicken ever stop to think about the impact to his…

Details

Lessons from the Sony Hack

Chris Carpenter

Director

DoD Cyber Crime Center

CISO InsightsBy Chris CarpenterJune 3, 2015

The recent Sony breach attributed to North Korea is only the latest in a series of Sony hacks that trace back to 2005.  Most news stories point to the recent…

Details

Compliance Beyond Black and White

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerMay 28, 2015

It’s now commonplace to read that security means more than checking off boxes on a compliance checklist.  A robust approach to security includes trying to fill the gaps between the…

Details
←1234567891011121314151617181920→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}