Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

CISO Insights

Privacy By Design Is Still Imperative

David Cass

GSR CISO | President CISOs Connect and Security Current | Senior Partner at Law & Forensics

CISO InsightsBy David CassJanuary 27, 2017

Each year brings more large-scale security and privacy breaches, leaving the general public questioning to what extent companies could be trusted with their sensitive information. Retail, health care, banking, entertainment, governments…

Details

NIST Cybersecurity Framework, Beyond Version 1.0 – Part 3

David Sheidlower

CISO

Turner Construction

CISO InsightsBy David SheidlowerJanuary 24, 2017

In this series I take a close look at the Framework for Improving Critical Infrastructure Cybersecurity which NIST first published in February of 2014. Read Part One ‘All Infrastructure and the…

Details

The Human Element of Incident Response – Part Four

Vanessa Pegueros

CISO

DocuSign

CISO InsightsBy Vanessa PeguerosJanuary 18, 2017

There is an extraordinary amount of money and time spent on detection and response relative to cybersecurity, and much of this conversation is technology focused.  In this series of articles,…

Details

How to Unlock Cybersecurity Talent

Daniel Conroy

CISO

Aviation and Aerospace Sector

CISO InsightsBy Daniel ConroyDecember 5, 2016

Today the cybersecurity sector is fraught with the challenge of a diminished talent pool. Cisco’s report, “Mitigating the Cybersecurity Skills Shortage,” highlights the worldwide shortage of one million information security…

Details

Ransomware in Healthcare – Strategies for Protecting the Enterprise – Part Three

Mitch Parker

Executive Director, Information Security and Compliance

Indiana University Health

CISO InsightsBy Mitch ParkerNovember 29, 2016

In this three-part series, Academic Health Care CISO Mitch Parker shares his insights on ransomware, incident response and best practices for building a world class prevention program. Read parts one and two.…

Details

The Human Element of Incident Response – Part Three

Vanessa Pegueros

CISO

DocuSign

CISO InsightsBy Vanessa PeguerosNovember 14, 2016

There is an extraordinary amount of money and time spent on detection and response relative to cybersecurity, and much of this conversation is technology focused.  In this series of articles,…

Details

Hacking the Election – The Emperor’s New Clothes

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattOctober 31, 2016

Normally, I would never talk about politics, and this story will not be an exception.  However, the analogy here is too good for me to pass up. Let’s say that…

Details

Data Breach Information You Can Chew On

Farhaad Nero

VP

Enterprise Security Bank of Tokyo-Mitsubishi

CISO InsightsBy Farhaad NeroOctober 17, 2016

We live in a time when data breaches are the norm. As information security and risk professionals we are tasked with trying to mitigate the risks posed by these impending…

Details

The Human Element of Incident Response – Part Two

Vanessa Pegueros

CISO

DocuSign

CISO InsightsBy Vanessa PeguerosOctober 17, 2016

There is an extraordinary amount of money and time spent on detection and response relative to cybersecurity, and much of this conversation is technology focused.  In this series of articles,…

Details

The Army of Things

John Masserini

CISO

Millicom (Tigo) Telecommunications

CISO InsightsBy John MasseriniSeptember 28, 2016

By now, you’re probably well aware of the fate recently befallen on the Brian Krebs site KrebsOnSecurity.com.  A Distributed Denial of Service (DDoS) attack in excess of 620/Gbps caused such…

Details

Ransomware in Healthcare – Strategies for Protecting the Enterprise – Part Two

Mitch Parker

Executive Director, Information Security and Compliance

Indiana University Health

CISO InsightsBy Mitch ParkerSeptember 19, 2016

In this three-part series, Academic Healthcare CISO Mitch Parker shares his insights on ransomware, incident response and best practices for building a world-class prevention program. Read part one. As a…

Details

Beyond Security and Privacy…A CISO’s Influence on the Ethical Use of Data

Bob Turner

CISO

University of Wisconsin-Madison

CISO InsightsBy Bob TurnerSeptember 1, 2016

This article is based on the closing keynote remarks I delivered at the IQPC Cybersecurity in Higher Education Conference in March 2016.  This is one higher education CISO’s viewpoint of…

Details
←1234567891011121314151617181920→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}