Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

CISO Insights

Be Very, Very Quiet – Your Devices May Be Listening

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattFebruary 11, 2015

According to Wikipedia, “The Internet of Things (IoT) is the interconnection of uniquely identifiable embedded computing devices within the existing Internet infrastructure. Typically, IoT is expected to offer advanced connectivity of devices, systems, and…

Details

The Wisdom of the CISO Crowd…In an Era of Security Products and Technologies DELUGE

Devon Bryan

CISO

The Federal Reserve System

CISO InsightsBy Devon BryanFebruary 3, 2015

The list of security products and technologies resulting from searches by even the least sophisticated Internet Search Engines across any of the major security product categories can be quite overwhelming.…

Details

My Security Fantasy

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattJanuary 29, 2015

My biggest security problems all start with authentication.  If you look at the major hacks that have taken place in the last year, you can trace most of them back…

Details

Risk Based vs. Rule Based

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerJanuary 27, 2015

I have always found that information security professionals tend to fall into three categories: SWAT Teams, Power Rangers or Nerds with an edge (see a blog post of that name…

Details

Business Continuity Planning, The CISOs Secret Weapon

John Masserini

CISO

Millicom (Tigo) Telecommunications

CISO InsightsBy John MasseriniJanuary 26, 2015

BCP.  Three little letters that, unfortunately, strike mind-numbing boredom into most CIOS’s.  The truth is, Business Continuity Planning isn’t synonymous with the excitement that is typically found in the Information…

Details

The 20 Critical Controls – A Practical Security Strategy – Part 1

Randy Marchany

CISO

Virginia Tech

CISO InsightsBy Randy MarchanyJanuary 20, 2015

Back in the late 1990’s, I was fortunate to be part of a team of cyber security experts who were asked to develop a list of the Top 10 Internet…

Details

10 Steps Towards an Information Security Program for Newly Established Companies

Farhaad Nero

VP

Enterprise Security Bank of Tokyo-Mitsubishi

CISO InsightsBy Farhaad NeroJanuary 19, 2015

It’s not a matter of if your company will be breached but when and for newly established companies or startups the when may be sooner rather than later. Startups are…

Details

If Not Now, When? If Not Us, Who? – “Tackling The Great Minority Cyber Divide”

Devon Bryan

CISO

The Federal Reserve System

CISO InsightsBy Devon BryanJanuary 15, 2015

In a November 2014 article, Lowell McAdam the CEO of Verizon made the following very bold public statement, “It’s Wrong That in a Room of 25 Engineers, Only 3 Are…

Details

The Importance of Privacy

David Cass

GSR CISO | President CISOs Connect and Security Current | Senior Partner at Law & Forensics

CISO InsightsBy David CassJanuary 14, 2015

Security and Privacy are essential in today’s digital economy.  2014 was a year of large-scale security and privacy breaches, leaving everyone asking themselves how much should we trust companies with…

Details

The Question of the Questions

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerJanuary 13, 2015

Incessant questioning can reduce the best thinking to no more than a background chorus of “Are we there yet?”  But there are still some things that have to be asked.…

Details

What’s Different About the Sony Hack… And What’s Not?

Larry Whiteside Jr.

CEO

Whiteside Security LLC

CISO InsightsBy Larry Whiteside Jr.December 23, 2014

Sony, Sony, Sony. Do you even realize what has just happened to you? Can you even comprehend the ripple effect this event will have not just on your industry, but everywhere?…

Details

GRC Debunker

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerDecember 11, 2014

(UPDATED) CISO’s and their teams are not just producers of risk analyses and assessments.  We are also consumers of them.  They come from many sources.  The main four are: Responses from…

Details
←1234567891011121314151617181920→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}