Select Page

CISO Interviews

This Is How All CISOs Should Build a Business Case

This Is How All CISOs Should Build a Business Case

Whether you’re deciding what to wear or where to eat, having options is ideal. The same is true when it comes to presenting your business case to your CIO or Board of Directors: you’re better off if you can give them options. Present them with three options: 1) a bare-minimum, 2) centrist, and 3) best-case, no holds barred approach to your cybersecurity program or a strategic initiative. This lets them know you’ve done your homework and it puts the onus on the decision maker, not you.

CISO Street recently interviewed Bryan Kissinger, CISO for Trace3 and author of “The Business Minded CISO.” In this video, Bryan discusses the best approach for building a business case for a security program.

THIS Is Why There Was an Increase in Malware Clickbait

THIS Is Why There Was an Increase in Malware Clickbait

When employees started working from home so, too, did the hackers. The rampant digital transformation opened up vulnerabilities for organizations that prioritized moving to digital quickly over moving to digital securely. Many organizations saw phishing emails containing malicious Zoom links or malware disguised as COVID-19 related webpages. Hackers easily took advantage and attacked these vulnerable devices now residing outside of the organization.

These Cloud Challenges Could Knock You Back Down to Earth

These Cloud Challenges Could Knock You Back Down to Earth

The cloud made the transition to working from home during the pandemic a lot easier. Applications like Office 365 allowed employees to transition from the corporate office to the home office with little disruption. The successful shift to telework proved that if an employee has a good internet connection, he or she can work from practically anywhere. Organizations continue to move systems and workflows to the cloud with the realization that the shift to remote work may stick even after everyone has been vaccinated. Buyers must beware, though, as this rush to the cloud brings plenty of challenges and invites risk.

Our CMMC Panelists Answer Your Questions

Our CMMC Panelists Answer Your Questions

Stacy Bostjanick, Director of CMMC Policy for the OUSD A&S, DoD, Mike Raeder, former Deputy CISO, Director Information Security for Northrop Grumman, and Alise Brzezinski, Practice Lead CMMC for Fortalice Solutions collaborated to answer viewer questions from our latest webinar, “Everything You Wanted to Know About CMMC Preparedness”. If you missed this webinar or would like to watch it again, you can view it below.

Want to Stress Out Your CISO? Here’s How.

Want to Stress Out Your CISO? Here’s How.

Lots of C-level executives deal with stress. CISO stress however may be unlike most others. Poorly defined expectations, a lack of training for the role, and exclusion from broader strategic discussions can lead a CISO to drink. In fact, a recent survey revealed a disturbing number of CISOs deal with work-related stress by consuming alcohol or other forms of self-medication.

A Conversation with Brian Fricke

A Conversation with Brian Fricke

In this interview, Brian explains how he transitioned employees from the office to the home, the need to redefine normal in a post-pandemic world, how he balances the company’s security needs with employee productivity and how he sees the CISO role evolving. He also shares the strangest issue he’s faced as a CISO, and what he does every Friday morning to stay engaged with his team.

Want to Be a CISO? Know This First.

Want to Be a CISO? Know This First.

“Trust but verify” is a mantra CISOs have traditionally applied to IT security but are now embracing when vetting technologies and technology vendors. Confined by tight budgets and an aversion to shelfware, CISOs need to be extremely confident in their technology investments. Ultimately, referrals, not flashy demos, matter. So for technology vendors looking to sell to CISOs, make sure your current customers love your product before selling it to anyone else.

Referrals, Not Fancy Product Demonstrations, Impress CISOs

Referrals, Not Fancy Product Demonstrations, Impress CISOs

“Trust but verify” is a mantra CISOs have traditionally applied to IT security but are now embracing when vetting technologies and technology vendors. Confined by tight budgets and an aversion to shelfware, CISOs need to be extremely confident in their technology investments. Ultimately, referrals, not flashy demos, matter. So for technology vendors looking to sell to CISOs, make sure your current customers love your product before selling it to anyone else.