article thumbnail

Meet the 50 CISOs to Watch in 2024

Lacework

Lacework is proud to present our second annual group of 50 CISOs to Watch, a compilation of the most visionary and effective cybersecurity leaders in the industry. In a field driven by constant change, what sets a cybersecurity leader apart? With new cybersecurity regulations like the U.S.

Security 131
article thumbnail

Secured by Women: Meet Rinki Sethi, VP and CISO at BILL

Lacework

Women’s representation in cybersecurity has come a long way in the last decade, but we still have progress to make before the balance truly shifts. That’s exactly why Lacework launched Secured by Women last year; and now, we’re thrilled to be back to continue championing the incredible women making a difference in cybersecurity.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

6 IT rules worth breaking — and how to get away with it

CIO

There are situations when this rule might need to be broken, such as when a critical security patch or an urgent business need demands immediate system changes, says product strategy consultant Michael Hyzy. “In Therefore, it’s vital to conduct a rigorous impact analysis and have rollback plans in place before proceeding,” Hyzy advises.

article thumbnail

7 sins of digital transformation

CIO

“To meet digital transformation goals, companies must build structural ambidexterity, focus on short-term efficiency opportunities that fit the current structure and model, but also pursue medium- to long-term discontinuous expansion opportunities in business that potentially would require structural and cultural changes,” Senan advises.

article thumbnail

Simple sabotage for software

Erik Bernhardsson

CIA produced a fantastic book during the peak of World War 2 called Simple Sabotage. Refer back to matters decided upon at the last meeting and attempt to re-open the question of the advisability of that decision. Encourage technical decisions based on wildly optimistic expectations of scale.

article thumbnail

Cyber Canon Book Review: Hacks that Shocked the World

Palo Alto Networks

We modeled the Cybersecurity Canon after the Baseball Hall of Fame and the Rock & Roll Hall of Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number. Book Reviewed by: Tracy Z.

article thumbnail

SAP 2024 outlook: 5 predictions for customers

CIO

SAP RISE will be an inevitable part of customers’ journey to the cloud Customers will begin to come to terms with the inevitability of RISE beyond SAP’s obvious motivations to drive adoption for increased renewable revenue and backlog bookings.