Cybersecurity Leadership
21.0K views | +0 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

How to navigate your way to stronger cyber resilience

How to navigate your way to stronger cyber resilience | Cybersecurity Leadership | Scoop.it
Defining cyber resilience and how to strengthen it
Scooped by JC Gaillard
Scoop.it!

Zero trust is a strategy, not a technology

Zero trust is a strategy, not a technology | Cybersecurity Leadership | Scoop.it
Zero-trust security should be seen as a strategy to protect high-value assets and is not tied to a specific technology or product, says the model’s creator John Kindervag
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Security Leaders And The C-Suite: Solving The Zero-Trust Strategy Gap

Security Leaders And The C-Suite: Solving The Zero-Trust Strategy Gap | Cybersecurity Leadership | Scoop.it
Achieving a zero-trust framework is a multi-year maturity mindset, one that requires trust and cooperation to ensure that the framework is built on a solid foundation.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

IT Modernization Efforts Need to Prioritize Cybersecurity

IT Modernization Efforts Need to Prioritize Cybersecurity | Cybersecurity Leadership | Scoop.it

Investing in a robust, well-orchestrated and coordinated cyber security plan is a competitive advantage that can provide valuable returns to your business. Keeping your organization, its people and its data safe is top of mind for every CEO.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and Strategy

Unifying Security Tech Beyond the Stack: Integrating SecOps with Managed Risk and Strategy | Cybersecurity Leadership | Scoop.it
Why should SecOps, risk management, and strategy work together? Find out how a unified approach can fortify your digital defenses.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Our Top 20 Cybersecurity Leadership Articles of 2023

Our Top 20 Cybersecurity Leadership Articles of 2023 | Cybersecurity Leadership | Scoop.it

Wishing all readers and followers a healthy and prosperous 2024

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cyber-awareness education is a change-management initiative

Cyber-awareness education is a change-management initiative | Cybersecurity Leadership | Scoop.it
A comprehensive strategy is required to detect and prevent cyber incidents, and your employees play a crucial role in this effort.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Most cloud moves found rushed as adopters underrate associated risks

Most cloud moves found rushed as adopters underrate associated risks | Cybersecurity Leadership | Scoop.it

A new study on the current state of cloud-native security found that a considerable number of cloud adopters do not understand the security risks of moving legacy applications to the cloud, opening themselves to a number of cloud-based attacks.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

More Companies Adopt Board-Level Cybersecurity Committees

More Companies Adopt Board-Level Cybersecurity Committees | Cybersecurity Leadership | Scoop.it
The hope is that these types of committees will tighten collaboration between boards and CISOs and lead to more support and resources for organizations’ cybersecurity strategies.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Designing a Security Strategy for Defending Multicloud Architectures

Designing a Security Strategy for Defending Multicloud Architectures | Cybersecurity Leadership | Scoop.it
Complex security issues arise when different clouds and computing models interact.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The CISO’s toolkit must include political capital within the C-suite

The CISO’s toolkit must include political capital within the C-suite | Cybersecurity Leadership | Scoop.it
Effective CISOs need to clearly articulate risk and mitigation strategies in business. They must be clear, precise, and, above all, speak truth to power.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Business priorities, not tools should dictate cybersecurity strategy

Business priorities, not tools should dictate cybersecurity strategy | Cybersecurity Leadership | Scoop.it

There are so many security tools in place today that there’s a risk that security teams rely too much on their toolsets and not enough on their cybersecurity strategy.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Is Your Cybersecurity Strategy Falling Victim to These 6 Common Pitfalls?

Is Your Cybersecurity Strategy Falling Victim to These 6 Common Pitfalls? | Cybersecurity Leadership | Scoop.it
NIST research reveals misconceptions that can affect security professionals — and offers solutions.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cyber resilience: A business imperative CISOs must get right

Cyber resilience: A business imperative CISOs must get right | Cybersecurity Leadership | Scoop.it
With ransomware at an all-time high, companies need to understand that being cyber resilient means going beyond compliance to considering all aspects of a business, from operational continuity to software supply chain security.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cybersecurity plans should center on resilience

Cybersecurity plans should center on resilience | Cybersecurity Leadership | Scoop.it
Organizations must base their cybersecurity strategies on resilience — the ability to weather an attack with minimal damage to data, finances, and reputation.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Is your cloud security strategy ready for LLMs?

Is your cloud security strategy ready for LLMs? | Cybersecurity Leadership | Scoop.it
Your existing cloud security practices, platforms, and tools will only go so far in protecting the organization from threats inherent to the use of AI's large language models.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Boardroom Guide To Govern AI And Secure Its Adoption

Boardroom Guide To Govern AI And Secure Its Adoption | Cybersecurity Leadership | Scoop.it
Boards have a central role to play, not just in the development of AI policies and processes, but in areas of cybersecurity.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Stronger together: Creating a cyber-secure community

Stronger together: Creating a cyber-secure community | Cybersecurity Leadership | Scoop.it
Corporate, public, and non-profit partnerships are key to creating stronger and better cybersecurity strategies.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Demystifying Cyber Resilience: From Best Practice to Execution

Demystifying Cyber Resilience: From Best Practice to Execution | Cybersecurity Leadership | Scoop.it
Francesco Chiarini, founder of High Value Target, explores what cyber resilience truly means for organizations – and how they can achieve it
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Insiders and outsiders: Why cybersecurity strategies need to look all ways

Insiders and outsiders: Why cybersecurity strategies need to look all ways | Cybersecurity Leadership | Scoop.it

Comprehensive visibility, employee awareness, proactive threat hunting and actionable threat intelligence are indispensable pillars of a robust cybersecurity strategy and just a few areas that organizations should keep in mind as they build their cybersecurity resilience

No comment yet.
Scooped by JC Gaillard
Scoop.it!

'Are we adversary aligned?' is the new 'Are we secure?'

'Are we adversary aligned?' is the new 'Are we secure?' | Cybersecurity Leadership | Scoop.it

Adversary alignment is more than just a strategy; it encourages CISOs and senior decision-makers to look at their security posture in an entirely new light.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Product security: Navigating regulations and customer expectations

Product security: Navigating regulations and customer expectations | Cybersecurity Leadership | Scoop.it
Following five success factors can help create a winning strategy for embedding security into the new-product life cycle.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Best practices for an effective cybersecurity strategy

Best practices for an effective cybersecurity strategy | Cybersecurity Leadership | Scoop.it

Few organizations would describe cybersecurity as unimportant, yet their cybersecurity strategy often remains overlooked because it needs time and attention to design and implement.

MagicMomentChicago's comment, July 21, 2023 3:15 AM
haii
MagicMomentChicago's comment, July 21, 2023 3:15 AM
hello
MagicMomentChicago's comment, July 21, 2023 3:15 AM
haii
Scooped by JC Gaillard
Scoop.it!

Why Less Is More When It Comes To Cybersecurity

Why Less Is More When It Comes To Cybersecurity | Cybersecurity Leadership | Scoop.it
With threats growing in sophistication and frequency, enterprises have adopted a "more is better" mentality.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Is the IT/OT Merge Holding Back Your Cybersecurity Strategy?

Is the IT/OT Merge Holding Back Your Cybersecurity Strategy? | Cybersecurity Leadership | Scoop.it
OT developed as a siloed environment focused on production. Convincing people that OT cybersecurity is required needs collaboration that breaks down the silos.
No comment yet.