Creating a culture in which individuals feel empowered to raise their hands – and leaders are willing to admit when a strategy isn’t working – is one of the keys to successful adaptive risk management, according to our panelists.
The key to gaining buy-in from senior leadership for cybersecurity solutions is in being able to identify the biggest risks and explain how they can be mitigated, said Patrick Voon and Aaron Miri during a recent webinar. “Be as transparent as possible.”
Obtaining cyber-insurance is more critical than ever, and yet, the process has become more costly and rigorous than in the past, said our IT security experts during a recent discussion. “You need to show that it’s a living process.”
What are the key differences between endpoint detection, extended detection and managed detection response solutions, and how can IT leaders make the best possible selection based on their organization’s needs? David Chou provides a “quick guide” on what CIOs, CTOs and CISOs need to know.
Running the day-to-day technology services is just one part of being a CIO, said Reid Stephan during a recent interview. “It’s being a trusted thought leader and a trusted executive partner to help drive the overall effectiveness of business operations.”