Ciso

  1. New CISO appointments 2023
  2. What is a virtual CISO? When and how to hire one
  3. Structuring the Chief Information Security Officer (CISO) Organization
  4. Certified Chief Information Security Officer Certification
  5. Unlocking the Path to Success: How to Become a CISO (Chief Information Security Officer)
  6. What Is A CISO? Their Role and Responsibilities Clearly Explained
  7. Chief Information Security Officer Responsibilities and Skills
  8. What Uber’s Joe Sullivan Case Means For ‘Sacrificial CISOs’
  9. What Uber’s Joe Sullivan Case Means For ‘Sacrificial CISOs’
  10. What is a virtual CISO? When and how to hire one


Download: Ciso
Size: 2.55 MB

New CISO appointments 2023

The upper ranks of corporate security are seeing a high rate of change as companies try to adapt to the evolving threat landscape. Many companies are hiring a chief security officer ( Follow this column to keep up with new appointments to senior-level security roles and perhaps gain a little insight into hiring trends. If you have an announcement of your own that you would like us to include here, contact New CISO appointments, May 2023 Former Twitter CISO Lea Kissner named CISO of Lacework Cloud security company Lacework has appointed Lea Kissner as its new chief information security officer. The former Twitter CISO will be responsible for leading the development and implementation of Lacework's overall security strategy and programs. Kissner has worked in cybersecurity for more than 20 years including as chief privacy officer at Humu and global lead of privacy technology at Google. Security and compliance automation platform Drata appoints Matt Hilary as vice president of security and CISO Matt Hilary has been named vice president of security and CISO at Security and compliance automation platform Drata. Hilary was formerly senior vice president systems and security and CISO at Lumio and previously held CISO and lead security roles at Weave and Workfront, Instructure, Adobe, MX, and Amazon Web Services. Bill O’Hern named CISO of Travelers Former AT&T chief security officer Bill O’Hern has been appointed as a senior vice president and CISO of insurance firm Travelers. O’H...

What is a virtual CISO? When and how to hire one

Chief information security officers (CISOs) are highly sought after, to the point where good ones are expensive and hard to come by. So this is a challenge when more and more organizations, reeling in the wake of CISO-less breaches like Could an on-demand virtual CISO (vCISO) be the answer to your prayers? A vCISO is an outsourced security practitioner or provider who offers their time and insight to an organization on an ongoing basis, usually part-time and remotely. Entrepreneur Jane Frankland, a CISO advisor and author of CSO last year, saying a virtual CISO “is someone who has spent years in the industry, has a wealth of experience having dealt with a wide variety of scenarios, and consults on the management of an organization’s information security. They’re usually engaged to design the organization’s security strategy, and some may manage the implementation. Many also present to the board, key stakeholders and regulators.” Do you need a vCISO? So far, so good, but cynics will likely point to that big question: Why would you need a vCISO when you could simply hire a real one on a permanent contract? The answer is varied and not necessarily the same for everyone. For starters, well-rated, full-time CISOs can be hard to come by, often stay in their job for two years or less, and critically, especially for smaller businesses, In contrast, vCISOs are estimated to cost between 30 percent and 40 percent of a full-time CISO and are available on-demand. The benefits go well b...

Structuring the Chief Information Security Officer (CISO) Organization

AMS Citation Mehravari, N., and Allen, J., 2016: Structuring the Chief Information Security Officer (CISO) Organization. Carnegie Mellon University, Software Engineering Institute's Insights (blog), Accessed June 15, 2023, https://insights.sei.cmu.edu/blog/structuring-chief-information-security-officer-ciso-organization/. Copy Chicago Citation Mehravari, Nader, and Julia Allen. "Structuring the Chief Information Security Officer (CISO) Organization." Carnegie Mellon University, Software Engineering Institute's Insights (blog). Carnegie Mellon's Software Engineering Institute, February 22, 2016. https://insights.sei.cmu.edu/blog/structuring-chief-information-security-officer-ciso-organization/. Copy IEEE Citation N. Mehravari, and J. Allen, "Structuring the Chief Information Security Officer (CISO) Organization," Carnegie Mellon University, Software Engineering Institute's Insights (blog). Carnegie Mellon's Software Engineering Institute, 22-Feb-2016 [Online]. Available: https://insights.sei.cmu.edu/blog/structuring-chief-information-security-officer-ciso-organization/. [Accessed: 15-Jun-2023]. Copy BibTeX Code @misc Copy Most organizations, no matter the size or operational environment (government or industry), employ a senior leader responsible for information security and cybersecurity. In many organizations, this role is known as In exploring the role of CISO, our team of researchers at the SEI's CERT Division explored the expanding operational risk environment with res...

Certified Chief Information Security Officer Certification

EC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program and outlining the content that would be covered by the exam, body of knowledge, and training. Some members of the Board contributed as authors, others as exam writers, others as quality assurance checks, and still others as trainers. Each segment of the program was developed with the aspiring CISO in mind and looks to transfer the knowledge of seasoned professionals to the next generation in the areas that are most critical in the development and maintenance of a successful information security program. The Certified CISO (CCISO) program is the first of its kind training and certification program aimed at producing top-level information security executives. The CCISO does not focus solely on technical knowledge but on the application of information security management principles from an executive management point of view. The program was developed by sitting CISOs for current and aspiring CISOs. In order to sit for the CCISO exam and earn the certification, candidates must meet the basic CCISO requirements. Candidates who do not yet meet the CCISO requirements but are interested in information security management can pursue the The CCISO Certification is an industry-leading program that recognizes the real-world experience necessary to ...

Unlocking the Path to Success: How to Become a CISO (Chief Information Security Officer)

The Chief Information Security Officer (CISO) is one of digital security’s most powerful and high-paying roles. As a CISO, you’ll have complete responsibility for all aspects of your organization’s data. You will also play a vital role in business strategy and help shape your company’s future. Becoming a CISO is generally considered the final destination of one’s cybersecurity career path. However, it’s never too early to start planning a route that takes you all the way to the boardroom, even if you’re only taking your first steps in the world of information security. CISO is a relatively new position in the C-Suite. However, numerous companies are deciding to appoint a dedicated director of security. Around 55% of all companies currently have a dedicated CISO on the board. Of those that don’t have a CISO, 58% say they will add this position (Navisite, 2021). In the past, IT security was part of the remit of other senior IT leaders. The Chief Technology Officer (CTO) or the Chief Information Officer (CIO) generally took responsibility for preventing cyberattacks. These executives would work with cyber security experts within the IT team to create robust digital defenses. However, the sheer scale of cyberthreats mean security is now a leadership issue. According to the FBI, cyber fraud has increased by almost 500% in the last five years (Federal Bureau of Investigation, 2021). The cost of a hack can run to USD 180 per individual file accessed (IBM Security, 2021). Organiza...

What Is A CISO? Their Role and Responsibilities Clearly Explained

The CISO (Chief Information Security Officer) or CSO (Chief Security Officer) is considered the ultimate data protection expert. This security professional is a C-level executive whose role focuses on personal and organizational data protection, assets, infrastructure, and IT security. The CISO plays the critical role of risk assessment, mitigation, and solution, acting in the company's best interests to curb and eliminate threats. CISOs typically report directly to the CEO, and their responsibility entails early detection and communication of potential security threats, preventive measures, and security roadmaps. This is achieved through their ability to identify, analyze and evaluate risks then employ effective and proactive solutions. A CISO's primary responsibility is to strategically and thoughtfully push forward the company's Despite their executive seating, CISOs are not dissociated from security team operations. The main objective of the office of the CISO is to support the success of cybersecurity operations by remaining informed about the latest transformations in the threat landscape and offering that knowledge to guide security initiatives. The ability to detect, assess and quantify potential Find out what qualities make for a successful CISO here. Defining A Chief Information Security Officer (CISO) As we have seen, a CISO is a senior-level executive responsible for managing an organization's • Establish the ideal security and governance practices that align w...

Chief Information Security Officer Responsibilities and Skills

Accredited Online Cyber Security Degrees • About Us • Mission Statement • Message from the Chairman • Board of Directors • Advisory Council • Administration & Faculty • Accreditation • Industry Advisory Board • University Rights & Responsibilities • Testimonials • Why Choose ECCU • Consumer Information Disclosure Form • Diversity, Equity & Inclusion • Academics • Why Online • 5 Benefits to attending classes online • Online Cyber Security Degrees • Grading System • Bachelor of Science in Cyber Security • Master of Science in Cyber Security • Security Analyst • Cloud Security Architect • Digital Forensics • Incident Management and Cyber Operations • Executive Leadership in Information Assurance • Master of Science in Computer Science • Graduate Certificate Program • Non-Degree • iLabs • Services • Information • Admissions • Pay Tuition • Complaints & Grievances • Request Transcript • Academic Calendar • FAQ • Test for EC-Council Certifications • Benefits • Disability and Accommodations Policy • Transferring Credit • EC-Council Certifications and Certification Comparisons • Forms • Catalog • Application • Admissions Application • Example Enrollment Agreement • EC-Council University Application Checklist • Financial Assistance • Scholarships • Cyber Challenge Scholarship • The Cyber Security Dean’s Scholarship • Cybersecurity Veteran’s Scholarship • New Mexico Scholarship • Associate’s Cyber Security Scholarship • Women in Cybersecurity Scholarship • Climb Funding • Veterans •...

What Uber’s Joe Sullivan Case Means For ‘Sacrificial CISOs’

Sign with logo at the headquarters of car-sharing technology company Uber in the South of Market ... [+] (SoMa) neighborhood of San Francisco, California, with red vehicle visible in the background parked on Market Street, October 13, 2017. SoMa is known for having one of the highest concentrations of technology companies and startups of any region worldwide. (Photo by Smith Collection/Gado/Getty Images) Getty Images Uber's former head of security, Joe Sullivan, was found guilty of obstructing an investigation by the Federal Trade Commission into Uber's security practices on Wednesday. He was also charged with hiding a 2016 data breach from authorities. This serious offense could have far-reaching implications for other Chief Information Security Officers (CISOs)- especially on the outsourced fractional/virtual CISO business model. On November 3, 2016, Sullivan was made aware of a data breach that had occurred at Uber. A hacker had gained access to the personal information of 57 million Uber users, including their names, email addresses, and phone numbers. Rather than reporting the breach to the authorities, Sullivan hid it. He then paid the hacker $100,000 to destroy the evidence and keep quiet about what had happened. This cover-up eventually came to light, and Sullivan was charged with obstruction of justice and witness tampering. He was fired from Uber in 2017 and pleaded not guilty to the charges in 2018. However, a jury found him guilty on all counts. He now faces up...

What Uber’s Joe Sullivan Case Means For ‘Sacrificial CISOs’

Sign with logo at the headquarters of car-sharing technology company Uber in the South of Market ... [+] (SoMa) neighborhood of San Francisco, California, with red vehicle visible in the background parked on Market Street, October 13, 2017. SoMa is known for having one of the highest concentrations of technology companies and startups of any region worldwide. (Photo by Smith Collection/Gado/Getty Images) Getty Images Uber's former head of security, Joe Sullivan, was found guilty of obstructing an investigation by the Federal Trade Commission into Uber's security practices on Wednesday. He was also charged with hiding a 2016 data breach from authorities. This serious offense could have far-reaching implications for other Chief Information Security Officers (CISOs)- especially on the outsourced fractional/virtual CISO business model. On November 3, 2016, Sullivan was made aware of a data breach that had occurred at Uber. A hacker had gained access to the personal information of 57 million Uber users, including their names, email addresses, and phone numbers. Rather than reporting the breach to the authorities, Sullivan hid it. He then paid the hacker $100,000 to destroy the evidence and keep quiet about what had happened. This cover-up eventually came to light, and Sullivan was charged with obstruction of justice and witness tampering. He was fired from Uber in 2017 and pleaded not guilty to the charges in 2018. However, a jury found him guilty on all counts. He now faces up...

What is a virtual CISO? When and how to hire one

Chief information security officers (CISOs) are highly sought after, to the point where good ones are expensive and hard to come by. So this is a challenge when more and more organizations, reeling in the wake of CISO-less breaches like Could an on-demand virtual CISO (vCISO) be the answer to your prayers? A vCISO is an outsourced security practitioner or provider who offers their time and insight to an organization on an ongoing basis, usually part-time and remotely. Entrepreneur Jane Frankland, a CISO advisor and author of CSO last year, saying a virtual CISO “is someone who has spent years in the industry, has a wealth of experience having dealt with a wide variety of scenarios, and consults on the management of an organization’s information security. They’re usually engaged to design the organization’s security strategy, and some may manage the implementation. Many also present to the board, key stakeholders and regulators.” Do you need a vCISO? So far, so good, but cynics will likely point to that big question: Why would you need a vCISO when you could simply hire a real one on a permanent contract? The answer is varied and not necessarily the same for everyone. For starters, well-rated, full-time CISOs can be hard to come by, often stay in their job for two years or less, and critically, especially for smaller businesses, In contrast, vCISOs are estimated to cost between 30 percent and 40 percent of a full-time CISO and are available on-demand. The benefits go well b...