Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

CISO Insights

Using Metrics to Improve Your Security Program

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattJanuary 2, 2018

So…you are responsible for the computer security of your organization. You probably have many great ideas on how to do this. You start looking around for products and services to…

Details

Demote the CISO

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerDecember 13, 2017

For the third straight year, Drs. Daniel Solove and Paul Schwartz held their Privacy and Security Forum at George Washington University Law School. For the third straight year I attended…

Details

Four Ways to Improve the Security of Blockchain

Mitch Parker

Executive Director, Information Security and Compliance

Indiana University Health

CISO InsightsBy Mitch ParkerDecember 6, 2017

Blockchain has the potential to be one of the most disruptive technologies since the invention of the Internet. There is an entire class of problems with distributed reconciliation of data…

Details

McAfee Acquisition of Skyhigh Networks Confirms CASB Market Predictions

Colin Anderson

SVP & Chief Information Security Officer

Ceridian

CISO InsightsBy Colin AndersonNovember 28, 2017

As business functions move to the cloud, it’s imperative to retain visibility into who is connecting to cloud applications, what they are doing, and what devices they are using to…

Details

Advice for Aspiring CISOs

Rebecca Wynn

Head of Information Security

Matrix Medical Network

CISO InsightsBy Rebecca WynnNovember 15, 2017

There are many skilled and intelligent people who aspire to become a Chief Information Security Officer (CISO). I have some career advice for them: Don’t aspire to be a CISO.…

Details

What Is at the Center?

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerJuly 10, 2017

I have gone back and forth for a long time.  Should security be risk-centric or data-centric.  Outside of security professionals, you sometimes meet people who believe security should be compliance-centric…

Details

Patch Yours

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerJuly 4, 2017

CISO Security professionals feel no great joy in being right about patching.  The past two months have been a period of “I told you so” moments for anyone who has…

Details

Blockchain Adoption and the Cybersecurity Practitioners Dilemma

Devon Bryan

CISO

The Federal Reserve System

CISO InsightsBy Devon BryanMay 29, 2017

“We drive into the future looking into our rear view mirrors” Marshall McLuhan (The views expressed in this article are entirely my own do not reflect the position of my employer…

Details

Security Metrics Can Make or Break a Security Program; How to Present to the Board

Roota Almeida

Head of Information Security

Delta Dental NJ

CISO InsightsBy Roota AlmeidaApril 13, 2017

CISOs are often in a situation where the CEO or a Board member asks them, “Just how secure are we?” Or “Are we secure enough?” These questions sound simple, but…

Details

Marketing Information Security at Tractor Supply

Security Current

CISO InsightsBy Security CurrentMarch 20, 2017

To Michael Mangold, the CISO of rural lifestyle retailer Tractor Supply Company, located outside Nashville, Tennessee, the most important skills for a CISO are not only technical. While his background…

Details

The Map of Cybersecurity Domains

Henry Jiang

CISO

Oppenheimer & Co.

CISO InsightsBy Henry JiangMarch 19, 2017

Recently, I posted a picture of a mind-map that I created just called “The Map of Cybersecurity Domains (v1.0).” The map was put together as a way to clear my head…

Details

Is Your Next Security Failure One Fat Finger Away?

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattMarch 12, 2017

The first week of March in 2017 will be remembered as the time that AWS (Amazon Web Services) failed. The actual failure was in the Amazon Simple Storage Service (S3), but…

Details
←1234567891011121314151617181920→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}