Edgewater Federal Solutions Names Chris Christianson as CISO - GovCon Wire: Edgewater Federal Solutions Names Chris Christianson as CISO GovCon Wire #CyberSecurity #InfoSec #SecurityInsights
iSecurity Social’s Post
More Relevant Posts
-
Up early for a flight to DFW. I am speaking this afternoon at the Enterprise Wireless Alliance (EWA) Wireless Leadership Summit in Ft Worth on the topic of “Cybersecurity Threats to Land Mobile Radio (LMR)”. Modern LMR systems are complex combinations of interconnected systems that have IT, OT and Critical Infrastructure characteristics. I will be addressing the application of the NIST Cybersecurity Framework and #ZeroTrust principles from the perspective of impact on business risk. #cybersecurity #csf #zerotrust #bsic
To view or add a comment, sign in
-
CISO SERIES This series seeks to explore the contributing factors that may explain why the tenure of the average Chief Information Security Officer (CISO) is substantially shorter than that of their other C-suite counterparts. Although it is widely acknowledged that the tenure of a CISO is generally shorter than other C-level positions, specific figures for this reduced tenure vary among industry surveys and reports. This series has been written by an experienced CISO about the role of a CISO. This series dives deep into several controversial topics about the CISO role, its history, and the inequities CISOs face in performance of their jobs. The series is broken into multiple parts and will continue as an area of research and publication for the Cyber Defense Center. Explore the CISO SERIES here: https://lnkd.in/gRCxZpP3. The first five (5) parts of the series are posted. 1) PART 1: 30 YEARS OF BREACHES - The history and impact of the CISO. 2) PART 2: CISOs ARE THE BURNER PHONES OF COMPANIES - Concerning trends with the CISO role and the 6 imbalances of the CISO role when compared to other C-level positions. 3) PART 3: IMPACT OF IMBALANCE: Imbalance adversely impacts the business and the CISO's tenure. 4) PART 4: BORN IN BATTLE: Why CISOs are essential in Wartime. 5) PART 5: CHANGE THE GAME: Making improvements, achieving balance, and assessing CISO effectiveness. #CISO, #CISOSERIES, #leadership, #cyberdefense, #cybersecurity, #informationsecurity, #riskmanagement
CISO SERIES
cyberdefensecenter.org
To view or add a comment, sign in
-
I speak with CISOs and Security professionals a lot and they often bring up poor first-line defence mechanisms as being high on their agendas. From using default credentials, no MFA and poor auditing procedures, these are still big concerns across the threat landscape for security leaders. Interestingly according to an IBM report, Cyber-attacks using stolen or compromised credentials increased 71% year-over-year! Strengthening your defenses with the right Cyber-security leadership is key and leveraging our network of experts can help you build a robust security posture. #CyberSecurity #InfoSec #CISO #CyberAwareness
To view or add a comment, sign in
-
The insights from the NMFTA 2024 Cybersecurity Conference made one thing clear: cybersecurity in logistics isn’t a “nice-to-have”—it’s mission-critical. As the digital thread weaves through supply chains, the stakes for protecting data, customer trust, and operational continuity have never been higher. Collaboration and proactive risk management were major themes. Table-top exercises may seem niche, but they foster decision-making and crisis response that can prevent real-world fallout. Leaders in logistics: How are you addressing these growing cyber risks? #Leadership #Logistics #Cybersecurity #Innovation
To view or add a comment, sign in
-
I am reposting this valuable comprehensive guide to SOC 📖📍📝
Master’s in Computer Science || Cisco Certified Network Associate (CCNA) || CompTIA Network+ || AWS Certified || Certified Network Security Practitioner
📚 Resource Spotlight: Building a Security Operations Center (SOC) If you're in cybersecurity or security operations, I highly recommend the Security Operations Center by Joseph Muniz, Gary McIntyre, MA CISSP, and Nadhem AlFardan. This comprehensive guide covers everything from SOC creation and infrastructure design to incident response and continuous improvement. The authors, with experience working with Fortune 500 companies and military organizations, offer real-world insights and best practices, making it valuable for both beginners and pros. Check out the free sample chapter to get started! 📖 #cybersecurity #SOC #securityoperations #networksecurity #ciscopress #SOCDevelopment #Infosec
To view or add a comment, sign in
-
CISOs are now celebrating 30 years of breaches and this series tells it like it is. What is expected of CISOs and the disparity between CISOs and other C-level positions is startling. If you are a CISO, are in IT or cyber security, or are an executive of a company, this series may indeed enlighten you as to why your security leaders seem to be missing the mark. Five (5) parts of the series are already posted. Here are a few notable quotables from inside the cover: “The average tenure of a CISO is now 18 months.” “Is C-I-S-O pronounced [Sis-o] or [See-so]?” “CISOs [are]...now celebrating 30 years of breaches.” “The CISO role is the only C-level position mandated by regulation.” “Role imbalances lead to an erosion of relevance.” “CISO roles are not included in … Directors and Officers Liability insurance plans.” “CISOs are walking around with a target on their backs.” "Born in battle, great CISOs thrive in conflict.” “Extinction Level Events (ELE) [can occur from] an unrecoverable breach or fraud that leads to a complete loss of trust.” “What we are doing is not working.” #cyberdefensecenter, #cyberdefense, #cybersecurity, #CISO, #informationsecurity, #riskmanagement, #leadership
CISO SERIES This series seeks to explore the contributing factors that may explain why the tenure of the average Chief Information Security Officer (CISO) is substantially shorter than that of their other C-suite counterparts. Although it is widely acknowledged that the tenure of a CISO is generally shorter than other C-level positions, specific figures for this reduced tenure vary among industry surveys and reports. This series has been written by an experienced CISO about the role of a CISO. This series dives deep into several controversial topics about the CISO role, its history, and the inequities CISOs face in performance of their jobs. The series is broken into multiple parts and will continue as an area of research and publication for the Cyber Defense Center. Explore the CISO SERIES here: https://lnkd.in/gRCxZpP3. The first five (5) parts of the series are posted. 1) PART 1: 30 YEARS OF BREACHES - The history and impact of the CISO. 2) PART 2: CISOs ARE THE BURNER PHONES OF COMPANIES - Concerning trends with the CISO role and the 6 imbalances of the CISO role when compared to other C-level positions. 3) PART 3: IMPACT OF IMBALANCE: Imbalance adversely impacts the business and the CISO's tenure. 4) PART 4: BORN IN BATTLE: Why CISOs are essential in Wartime. 5) PART 5: CHANGE THE GAME: Making improvements, achieving balance, and assessing CISO effectiveness. #CISO, #CISOSERIES, #leadership, #cyberdefense, #cybersecurity, #informationsecurity, #riskmanagement
CISO SERIES
cyberdefensecenter.org
To view or add a comment, sign in
-
The role of the chief information security officer (CISO) is no longer the strictly technically-oriented one it once was. Jeff Moore, Fortune 500 CISO, talks about his experience with how quickly his position has changed over the past few years and how it requires him to wear many more hats, communicate effectively with board members, and rethink how cybersecurity enables organizational growth. Today, being a CISO requires the development of leadership skills and the ability to translate the complexities of cyber risk into more universal business terms, fostering meaningful, data-driven discussions. #ShiftUpSummit #ShiftUp #CRQ #cybersecurity #cyberriskmanagement Kovrr Microsoft ISS-Corporate Valence Security Silverfort
To view or add a comment, sign in
-
Insightful interview with Dean Hamilton on the realities of implementing ZTNA. Reach out to me if you want to discuss this very challenging transition in cybersecurity.
In this Help Net Security interview, Dean Hamilton, CTO at Wilson Perumal & Company, discusses the complexities of zero trust network access (ZTNA) implementation, focusing on balancing security with operational efficiency. Hamilton highlights strategic planning, collaboration between IT and business leaders, adapting to emerging challenges, continuous improvement, and using metrics to assess ZTNA success and manage risks. https://lnkd.in/dUt5cyji #zerotrust #ztna #artificialintelligence #supplychainattacks #strategy #policy #humanerror #cybersecurity #netsec #security #infosecurity #ciso #itsecurity #cybersecuritynews #securitynews
To view or add a comment, sign in
-
CISO SERIES PART 1: 30 YEARS OF BREACHES CISOs are now celebrating 30 years of breaches yet are still responsible for stopping and preventing breaches. They still report two to three organizational structure levels deep within their respective organizations, although the “C” title designation has generally been adopted. Most of the time the CISO role reports to the chief technology leader (CIO or CTO), and their budgets and authority are subject to the priority these leaders place on their areas of responsibility. Unlike the revenue alignment of other technology services, CISOs are still considered a cost center or burden to the bottom line. The CISO is still the primary subject matter expert on security and compliance, even as cyber security training and course requirements are now included as part of university degrees. And the most enduring and consistent responsibility of CISOs that has remained the same since the position’s inception, the CISO is the burner phone of corporations. The scapegoat, or fall guy, for executive leaders and the board when an inevitable breach or catastrophic security incident occurs. Read the full post here on the history and impact of CISOs: https://lnkd.in/g3kjaiY7 #CISO, #CISOSERIES, #leadership, #cyberdefense, #cybersecurity, #informationsecurity, #riskmanagement
CISO SERIES: PART 1
cyberdefensecenter.org
To view or add a comment, sign in
-
Cyber threats and regulations are rapidly evolving, underscoring the urgency for companies to have strategic hashtag #cybersecurity voices in the highest levels of leadership. Our Modern CISO Network Board Book bridges this gap, highlighting talented CISOs who are not just technical experts — they’re business leaders skilled in risk management, communication, and driving organizational resilience. 💪 Read it here: https://okt.to/Bx5q0C #CISO #SecurityLeadership #ModernCISONetwork #cyberthreats #cybercrime
Introducing the third edition of the CISO Board Book
lacework.com
To view or add a comment, sign in
1,568 followers