The Complicated Relationship Between CIOs and CSOs

By Jack Rosenberger In the wake of the news that Target’s profit fell more than 40 percent during the fourth quarter of 2013, due in large part to a data breach that affected up to 110 million customers, CIO Insight interviewed Eric Cole, a SANS Institute Faculty Fellow and the head of SANS’s Cyber Defense…

The Complicated Relationship Between CIOs and CSOs

How can CIOs and CSOs work together better? What has made CIO-CSO relationships work in situations you’ve observed? In order for the CIO and CSO to have an effective working relationship, they must have clear boundaries of responsibility. Typically what works best is for the CSO to define the proper level of security, the CIO…

Cyber Security: Are Stricter Regulations the Answer?

by Torsten George of Agiliance On October 13, 2011 the Securities and Exchange Commission (SEC) Division of Corporation Finance released a guidance document that outlines disclosure practices for public companies in light of the most recent spike in cyber security attacks and associated data breaches. The guidance document hints that companies have to be paying…

Inside the Cyber Threat Landscape

Today’s advanced cyber criminals are committed to stealing data, disrupting services and maintaining access to a target environment for as long as possible (enabling future intrusions). These threats apply to all industries, not just those that deal with credit cards or personal information. Companies that have proprietary data that is perceived to be of economic…

Top 10 Smartphone Security Tips

When it comes to security issues, smartphone users are a bit delusional in believing the phone is safer than the PC. “If you can access data on your smartphone, so too can hackers,” warned Martin Hack, EVP of NCP engineering. What can thieves get from your phone? Access to your mobile banking site complete with…

Cybersecurity Talent Shortfall Threatens Everyone

WASHINGTON — Official pronouncements from economists that the recession is officially over may have done little to lift the national mood while unemployment remains perilously high. But in one field, cybersecurity, the supply-demand imbalance of the broader labor market is upside down, with government agencies and private-sector firms aggressively recruiting and hiring experts in the…

Cyber War is Part of Real-World Conflicts Today

On August 8, 2008 Nino Doijashvili, CEO of Atlanta-based hosting company Tulip Systems was paying a visit to her home town in Tsiblinki, Georgia, thus putting her at the nexus of the first modern use of cyber attacks in conjunction with an invasion. While Russia amassed a force of 150 tanks on the border of…