Skip to content
Twitter page opens in new windowLinkedin page opens in new window
  • Contact Us
top-bar
Security Current
Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions.
Security Current

  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles
Search:
  • CISO
    • Blogs
    • CISO Spotlights
    • CISO Insights
  • Articles
    • Featured Articles
    • Expert Insights
    • Archived Articles
  • News
  • Events
    • CISOs Top 100 CISOs 2023
    • CISOs Connect™ Security Shark Tank® NYC 2023
    • CISO Choice Awards 2022
      • CISO Choice Awards 2022 Winners
      • CISOs Connect™ and Security Current® Announce 2022 Winners of the CISO Choice Awards
      • CISO Choice Awards Finalists 2022
      • CISO Choice Awards Fees and Costs
    • CISOs Connect™ Chicago 2022
    • CISOs Top 100 CISOs (C100) 2022
    • Security Shark Tank® New York City 2022
    • CISO Choice Awards 2021
    • CISOs Top 100 CISOs 2021
    • CISO Choice Awards 2020
    • Virtual Security Shark Tank®
    • Security Shark Tank® During RSA 2020
  • Resources
    • CISOs Investigate Reports
    • Executive Overviews
    • Videocasts
    • Webinars
    • White Papers
  • Industry
    • Vendor Spotlights
    • Executive Viewpoints
    • Vendor Listings
  • About
    • Community Contributors
    • Editorial Board Members
  • Browse All
    • CISO
      • CISO Spotlights
      • CISO Insights
    • Resources
      • CISOs Investigate Reports
      • Executive Overviews
      • Videocasts
      • Webinars
      • White Papers
    • Events
    • News
    • Vendor
      • Vendor Spotlights
      • Executive Viewpoints
      • Vendor Listings
    • About
      • Community Contributors
      • Editorial Board Members
    • Articles
      • Featured Articles
      • Expert Insights
      • Archived Articles

CISO Insights

Just Listen – A CISO’s Advice to Security Vendors

Christine Vanderpool

CISO

Florida Crystals

CISO InsightsBy Christine VanderpoolFebruary 22, 2016

Close your eyes and imagine you are standing in the middle of a car dealership showroom floor. What feelings and emotions are invoked? Do you feel stress, anger, hesitation, nauseated…

Details

Cyber Insurance – The New Norm: A CISO’s Perspective

Roota Almeida

Head of Information Security

Delta Dental NJ

CISO InsightsBy Roota AlmeidaFebruary 19, 2016

Just about every business today needs cyber-insurance. More and more small businesses are doing online transactions and it will only increase as we move forward. A company with fewer amounts…

Details

10 CISOs Say Cyber Insurance is Growing and Evolving, but Adoption Comes with Caveats

Security Current

CISO InsightsBy Security CurrentFebruary 18, 2016

Ten CISOs from across industries share insight on the future of cyber insurance and tips for success. Most CISOs agree the market for cyber insurance is growing and evolving. However,…

Details

When Does Privacy Trump Security?

Joel Rosenblatt

Director of Computer and Network Security

Columbia University

CISO InsightsBy Joel RosenblattFebruary 18, 2016

I have been watching the case I will call Apple vs FBI carefully.  It is not quite David vs Goliath, because Apple is not some two-bit company with limited resources,…

Details

An Assessment of the Framework for Improving Critical Infrastructure Cybersecurity – Part 4

Brian Lozada

CISO

Zocdoc

CISO InsightsBy Brian LozadaFebruary 17, 2016

In this five-part series CISO Brian Lozada examines the state of cybersecurity in our nation’s critical infrastructure, what is at risk, what makes it unique and what measures can be taken…

Details

Biometrics: The Future of Authentication

Frank Bradshaw

CEO & CISO

Ho'ike Technologies

CISO InsightsBy Frank BradshawFebruary 11, 2016

Since ancient times, passwords have been used as a form of identity. Passwords offered the ability to validate someone based on something supposedly known only by the individual or group.…

Details

Cut the FUD: Four Reasons Cloud Brings Security Advantages

Devon Bryan

CISO

The Federal Reserve System

CISO InsightsBy Devon BryanFebruary 9, 2016

At the risk of being ‘voted off CISO island’ or worse, ‘lose my CISO card,’ I’m prepared to make an argument contrary to the popular opinions expressed by many of…

Details

Never Say Never: US & EU Come to Agreement on New Framework

David Cass

GSR CISO | President CISOs Connect and Security Current | Senior Partner at Law & Forensics

CISO InsightsBy David CassFebruary 2, 2016

My mom always told me to never say never, so it’s a good thing I didn’t say it in my previous article. Although technically the deadline was January 31, there…

Details

As We Reach the End of the Voyage for Safe Harbor What are US Companies To Do?

David Cass

GSR CISO | President CISOs Connect and Security Current | Senior Partner at Law & Forensics

CISO InsightsBy David CassFebruary 1, 2016

The deadline for the U.S. and European Union (EU) to come to an agreement on the future of Safe Harbor, which governs transatlantic data transfers, passed on January 31. Although…

Details

10 CISOs Say Passwords are Failing and Must be Augmented or Supplanted

Security Current

CISO InsightsBy Security CurrentJanuary 27, 2016

Ten CISOs from across industries weigh in on the effectiveness of passwords, with most predicting that the days are numbered for the password as the sole authentication method. They see enterprises…

Details

A CISO Checklist: 11 Reasons to Avoid the Cloud

Farhaad Nero

VP

Enterprise Security Bank of Tokyo-Mitsubishi

CISO InsightsBy Farhaad NeroJanuary 24, 2016

Recall these 2 famous quotes: “The horse is here to stay but the automobile is only a novelty – a fad.” Michigan Savings Bank president advising Henry Ford’s lawyer, Horace…

Details

A CISOs Role in Cyber Security Insurance Decisions

Michael Molinaro

CISO & VP

BioReference Laboratories Inc.

CISO InsightsBy Michael MolinaroJanuary 21, 2016

In the insurance business, it’s all about the “policy,” and finding the right policy is akin to modern day horse trading. It’s important to understand the specifics of your coverage…

Details
←1234567891011121314151617181920→
Security Current
© Security Current 2023
Go to Top
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}