Latest from todayfeature8 obstacles women still face when seeking a leadership role in ITFor women, the IT career ladder is littered with obstacles, bias, and challenges that cannot always be overcome without the help of allies.By Christina Wood07 Mar 20258 minsCareersIT Leadership feature What is risk management? Quantifying and mitigating uncertaintyBy Josh Fruhlinger07 Mar 202510 minsIT Governance FrameworksIT LeadershipRisk Managementnews analysis 60% of cybersecurity pros looking to change employersBy John Leyden06 Mar 20255 minsCareersIT Leadership opinionThe risks of standing down: Why halting US cyber ops against Russia erodes deterrenceBy Christopher Whyte 06 Mar 20258 minsAdvanced Persistent ThreatsCSO and CISOThreat and Vulnerability Management opinionWhat CISOs need from the board: Mutual respect on expectationsBy David Gee 26 Feb 20256 minsBusiness IT AlignmentCSO and CISOCompliance featureHow to create an effective incident response planBy Bob Violino 25 Feb 202511 minsIT LeadershipIncident ResponseSecurity featureStrategic? Functional? Tactical? Which type of CISO are you?By Mary K. Pratt 24 Feb 20259 minsCSO and CISOHuman ResourcesSecurity Practices featureManaging the emotional toll cybersecurity incidents can take on your teamBy Cynthia Brumfield 21 Feb 202511 minsCSO and CISOHuman ResourcesSecurity Practices opinionThink being CISO of a cybersecurity vendor is easy? Think againBy Tyler Farrar 19 Feb 20257 minsCSO and CISOHuman ResourcesIT Leadership ArticlesfeatureHow CISOs can rebuild trust after a security incidentCybersecurity leaders share insight on a crucial but overlooked task after any security incident: rebuilding trust with the stakeholders that matter the most. By Eric Frank 18 Feb 2025 10 minsBusiness IT AlignmentCSO and CISOIncident ResponsefeatureWTF? Why the cybersecurity sector is overrun with acronymsAcronyms are an easy way to remember and reference long-winded technical terms, but sometimes too many can hinder understanding or even become a problem in such a high-stakes industryBy Lee-Anne Goodman 11 Feb 2025 9 minsCSO and CISOHuman ResourcesIT Leadershipnews analysis39% of IT leaders fear major incident due to excessive workloadsIT leaders worry that ongoing staff shortages in the face of escalating workloads could result in a business-crippling event. Security specialists point to retraining and other techniques to help mitigate the problem.By Evan Schuman 03 Feb 2025 6 minsIT SkillsIncident ResponseSecurity Operations CenterfeatureWant to be an effective cybersecurity leader? Learn to excel at change managementThese 10 steps can help CISOs and other cyber pros deal with the inevitable change they will face in an industry constantly challenged by new technology, widening business responsibilities, and an ever-evolving threat landscape.By Mary K. Pratt 29 Jan 2025 11 minsBusiness IT AlignmentBusiness Process ManagementCSO and CISOopinionThe cybersecurity skills gap reality: We need to face the challenge of emerging techNew research indicates an acute need for security professionals proficient with emerging and advanced technologiesBy Jon Oltsik 28 Jan 2025 4 minsCSO and CISOHuman ResourcesIT SkillsfeatureCISOs’ top 12 cybersecurity priorities for 2025Securing the enterprise requires wide-ranging initiatives — with an eye on the bottom line. Here’s what IT security leaders are prioritizing today.By Mary K. Pratt 27 Jan 2025 9 minsCloud SecurityComplianceIT StrategyopinionCybersecurity needs women — and it needs to treat them betterWell into the 21st century, women still make up only 25% of the cybersecurity workforce — a mind-boggling issue that security leaders, cyber pros, and the industry at large must work to address.By Christopher Burgess 27 Jan 2025 9 minsHuman ResourcesIT LeadershipIT SkillsfeatureCybersecurity is tough: 4 steps leaders can take now to reduce team burnoutA happy team makes for a happy CISO, which reduces burnout and staff turnover at all levels. Here are some low-budget approaches top professionals have taken to ease the stress.By Deb Radcliff 22 Jan 2025 8 minsCSO and CISOHuman ResourcesSecurity PracticesopinionSecurity chiefs whose companies operate in the EU should be exploring DORA nowDetermining if your entity falls within DORA should be on the radar of every CRO, general counsel, and CISO whose company operates in Europe – penalties for non-compliance can be stiff.By Christopher Burgess 22 Jan 2025 6 minsCSO and CISOGDPRRegulationopinionCybersecurity hiring is deeply flawed, demoralizing, and needs to be fixedA process that should be about the excitement of career development or a fresh start has become a frustrating experience where automated systems overwhelm a confused and misguided recruitment regime.By Tyler Farrar 16 Jan 2025 8 minsCSO and CISOHuman ResourcesIT JobsopinionThe CFO may be the CISO’s most important business allyDespite natural tensions, a CISO-CFO alliance can help CISOs become better business leaders and ensure the business better balances risk and innovation.By David Gee 15 Jan 2025 6 minsBudgetBusiness IT AlignmentCSO and CISOfeatureBeware cybersecurity tech that’s past its prime — 5 areas to check or retireCybersecurity products are evolving quickly, more so than ever with the advent of AI-driven resources. Here are some technologies and practices that are getting long in the tooth.By Mary K. Pratt 14 Jan 2025 7 minsCSO and CISOSecurity HardwareSecurity Practices Show more Show less View all Resources whitepaper Real-Time, All the Time: Fuelling AI success through a continuous data stream With AI dominating conversations everywhere, practitioners and executives are seeking answers: How to succeed with GenAI? Delivering on AI initiatives requires the right strategy, platform and data stack. The post Real-Time, All the Time: Fuelling AI success through a continuous data stream appeared first on Whitepaper Repository –. By StreamSets 26 Aug 2024Artificial IntelligenceData and Information SecurityData Management View all Video on demand videoCSO Executive Sessions: Hong Kong Baptist University’s Allan Wong on security leadershipAllan Wong – Director of Information Technology at Hong Kong Baptist University – joins Xiou Ann Lim for this CSO Executive Sessions interview. They talk about leadership, talent, and more. 05 Sep 2024 10 minsEducation IndustryIT Leadership CSO Executive Sessions / ASEAN: Francis Yeow on talent 05 Apr 2023 17 minsIT LeadershipSecurity CSO Executive Sessions / ASEAN: Darren Argyle of Standard Chartered Bank 03 Nov 2022 19 minsFinancial Services IndustryIT LeadershipSecurity CSO Executive Sessions / ASEAN: David Walker on data, security, and innovation 12 Oct 2022 14 minsIT LeadershipSecuritySee all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry Network Security Physical Security Privacy Risk Management View all topics Show me morePopularArticlesPodcastsVideos news Linux, macOS users infected with malware posing as legitimate Go packages By Shweta Sharma 07 Mar 20253 mins MalwareSecurity news analysis Chinese APT Silk Typhoon exploits IT supply chain weaknesses for initial access By Lucian Constantin 06 Mar 20256 mins Advanced Persistent ThreatsGovernmentHacker Groups news US charges 12 Chinese hackers in major government-backed espionage campaign By Gyana Swain 06 Mar 20255 mins CybercrimeSecurity podcast CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video CSO Executive Sessions: How cybersecurity impacts company ratings – A fey factor for investors and consumers 12 Feb 202527 mins Security video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain