Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

CISO Insights

How Not to Gamble with Your IT Security Strategy

Christine Vanderpool

CISO

Florida Crystals

CISO InsightsBy Christine VanderpoolMarch 30, 2015

It’s no secret that I love Las Vegas and all it has to offer including gambling. To me, this is a natural affection due to what I do in my…

Details

Path to a Career in Cyber and Key Tools

Gary Hayslip

VP & CISO

Webroot

CISO InsightsBy Gary HayslipMarch 26, 2015

In the first two parts in my series, a “Path to a Career in Cyber” and a “Path to a Career in Cyber Part and Then Some,” I explained how I…

Details

Path to a Career in Cyber and Then Some

Gary Hayslip

VP & CISO

Webroot

CISO InsightsBy Gary HayslipMarch 18, 2015

Part one in the series Path to a Career in Cyber can be read here In my first article “Path to a Career in Cyber” I explained how I got into IT and…

Details

No Book to Be By

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerMarch 17, 2015

In some cases, hiring a project manager is the most sensible thing you can do.   A seemingly can’t miss action that preserves the status quo while getting the organization where…

Details

CISOs – Maintaining the Vision

Farhaad Nero

VP

Enterprise Security Bank of Tokyo-Mitsubishi

CISO InsightsBy Farhaad NeroMarch 16, 2015

The only thing worse than being blind is having sight but no vision – Helen Keller According to a newly released report, 54% of security professionals said they were under…

Details

My Parents Taught Me to Share, So What’s the Big Deal?

Jeff Misrahi

Director of Data Security

Health Sector

CISO InsightsBy Jeff MisrahiMarch 12, 2015

President Obama wants private sector companies to share information about cybersecurity threats  with each other – and the government.  That sounds like a novel idea – and some industries already…

Details

Path to a Career in Cyber

Gary Hayslip

VP & CISO

Webroot

CISO InsightsBy Gary HayslipMarch 11, 2015

When I started my career in the US Navy, almost three decades ago, I originally went into the field of advanced electronics. It was close to what I wanted to…

Details

Cybersecurity Comes to Prime Time

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattMarch 10, 2015

I watched the latest show in the “CSI” franchise last night – CSI: Cyber (on CBS) and my thoughts were “There goes the neighborhood.” I must say that I’m not…

Details

Audited and Jaded

Jeff Misrahi

Director of Data Security

Health Sector

CISO InsightsBy Jeff MisrahiMarch 4, 2015

A company I know was audited some years ago. One of the findings was that there were no Unix server logs. Over the next year server logging was enabled. The…

Details

Cyber, It’s All About the Maybe

Gary Hayslip

VP & CISO

Webroot

CISO InsightsBy Gary HayslipFebruary 24, 2015

As a CISO, you will find your job requires you to have experience in many areas. As the leading cyber security executive for your organization you will be expected to…

Details

Risk Averse. Rule Averse.

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerFebruary 17, 2015

It’s 2 in the morning.  You are stopped at a well-lit, completely empty intersection looking up at a red light.  If you’re like me, you will wait till that light…

Details

Plight of Passwords

John Masserini

CISO

Millicom (Tigo) Telecommunications

CISO InsightsBy John MasseriniFebruary 15, 2015

I read an article recently about how a CISO talked his way out of having an internal auditor write up a finding about weak passwords – which eventually lead to…

Details
←1234567891011121314151617181920→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}