The key to gaining buy-in from senior leadership for cybersecurity solutions is in being able to identify the biggest risks and explain how they can be mitigated, said Patrick Voon and Aaron Miri during a recent webinar. “Be as transparent as possible.”
Obtaining cyber-insurance is more critical than ever, and yet, the process has become more costly and rigorous than in the past, said our IT security experts during a recent discussion. “You need to show that it’s a living process.”
What are the key differences between endpoint detection, extended detection and managed detection response solutions, and how can IT leaders make the best possible selection based on their organization’s needs? David Chou provides a “quick guide” on what CIOs, CTOs and CISOs need to know.
Running the day-to-day technology services is just one part of being a CIO, said Reid Stephan during a recent interview. “It’s being a trusted thought leader and a trusted executive partner to help drive the overall effectiveness of business operations.”
With phishing attacks becoming increasingly sophisticated, the smart approach is to focus not on prevention, but on identifying the most likely targets, putting controls in place, and offering continuous education, according to our cybersecurity experts.