Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

CISO Insights

The Silver Lining of an Intense Security Week

David Sherry

CISO

Princeton University

CISO InsightsBy David SherryOctober 1, 2014

As security practitioners, we know that nary a day goes by when our schedule for the day (or week) goes as planned.  There is always an alert to address, an…

Details

The Time for F.U.D. is Over… Long Live F.U.D…

John Masserini

CISO

Millicom (Tigo) Telecommunications

CISO InsightsBy John MasseriniSeptember 24, 2014

I’ve been known to say that ‘I’ve been in InfoSec since before it was cool.’  After 20 years of being on the front lines, first as a consultant, then as…

Details

The Point Beside the Point

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerSeptember 15, 2014

If we live in a data-centric world, it is still true that data are more immediate for some than for others.  To use one individual as an example: by the…

Details

Why Is Everything Turning Into a Reality TV Show?

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattAugust 28, 2014

Someone recently pointed out an article to me:  ‘Big 12 beats Ivy League – in cybersecurity’ I didn’t realize that there was a competition between schools as to who does…

Details

Big Data And Us Little People

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerAugust 25, 2014

The last series I wrote for securitycurrent dealt with principles of data security and privacy. Many authorities charged with enforcing data protection accept the principles. They are based on the idea that…

Details

Are CISOs Better Off When They Think Like Security Entrepreneurs?

Larry Whiteside Jr.

CEO

Whiteside Security LLC

CISO InsightsBy Larry Whiteside Jr.August 21, 2014

Recently I have begun to think about the strengths that make a good CISO. Some of those include technical understanding, business acumen, strategic vision, collaborative mindset, risk management mindset, and…

Details

Thanks for the CISO Recognition (I think)

David Sherry

CISO

Princeton University

CISO InsightsBy David SherryJuly 28, 2014

Most of you reading this are security practitioners, and I can safely assume that each of you has discussed this topic at conferences and airports for years:  Is our role…

Details

Advice for the Incoming CISO of Target

Security Current

CISO InsightsBy Security CurrentJuly 17, 2014

There is no task more difficult for a CISO than stepping into that role at a large organization that has never had a CISO and has recently experienced a devastating…

Details

When is it a Breach?

Randy Marchany

CISO

Virginia Tech

CISO InsightsBy Randy MarchanyJune 26, 2014

One of the most difficult decisions a CISO has to make is the one that says the organization suffered a data breach. A data breach starts a chain of events…

Details

CISOs as Rock Stars. Really?

David Sherry

CISO

Princeton University

CISO InsightsBy David SherryJune 17, 2014

Life as a Chief Information Security Officer can oftentimes be hard on the ego.  It is surely one career in which it is easy to fall in to an identity…

Details

Heartbeat, Heartbleed or Heartache?

Randy Marchany

CISO

Virginia Tech

CISO InsightsBy Randy MarchanyMay 8, 2014

You almost have to be on some deserted island with no Internet access to have not heard about the OpenSSL Heartbleed vulnerability. This vulnerability is very serious and pervasive because…

Details

Why I Hate Phishing

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattApril 25, 2014

Thursday, April 18 started out as a normal day (except for all of the Heartbleed hubbub), that was, until we realized that the University had been hit with about 32K…

Details
←1234567891011121314151617181920→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}