article thumbnail

INE Security Enables CISOs to Secure Board Support for Cybersecurity Training

CIO

If there is a single theme circulating among Chief Information Security Officers (CISOs) right now, it is the question of how to get stakeholders on board with more robust cybersecurity training protocols. But it isn’t a question of ”if” an organization will be targeted, but “when.”

Security 238
article thumbnail

3 key metrics for cybersecurity product managers

TechCrunch

Context matters a lot, and the realities of different organizations, geographies, cultures and market segments heavily influence what can be measured and what actions can be taken based on these observations. Detection accuracy Although not all cybersecurity products are designed to generate some kind of detections, many do.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Elevate Your Protection Strategy at CSO’s Future of Cybersecurity Summit

CIO

Here’s the secret to creating a board presentation on cybersecurity, according to Victor Shadare, head of cybersecurity at the international publishing giant Condé Nast : “The board doesn’t have time to look at detail as such. They want something that’s going to punch them in the face,” he said.

Strategy 304
article thumbnail

SeeMetrics scores $6M seed to surface key security metrics for CISOs

TechCrunch

Every CISO (chief information security officer) is tasked with keeping the company safe and secure, but it isn’t always easy to see what’s happening on the ground inside a large organization with a multitude of tools crossing many different departments. I bought all those encryption tools.

Security 215
article thumbnail

Achieving Elite and High Performance DevOps Using DORA Metrics

Speaker: Nico Krüger, Senior Director of Solutions Engineering at Rollbar

How is your organization’s DevOps doing? DevOps Research and Assessment (DORA) has identified four key metrics to help organizations understand where their DevOps stands and how it can reach an elite level of performance. Build in security from the start. Improve the stability of your software.

article thumbnail

Information Security Governance

Prisma Clud

Protecting information consistently across the enterprise means having the right people at the right level engaged so that the information security program can align with business and technology strategy. Many information security leaders find this task daunting. What does the CEO know about security?

article thumbnail

AI in Cybersecurity — A CISO’s Perspective

Palo Alto Networks

{{interview_audio_title}} 00:00 00:00 Volume Slider 10s 10s 10s 10s Seek Slider “ AI’s Impact in Cybersecurity ” is a blog series based on interviews with a variety of experts at Palo Alto Networks and Unit 42 with roles in AI research, product management, consulting, engineering and more.

article thumbnail

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Keys to automation at different stages of organization maturity. How Amazon thinks about metrics. In this fast paced talk, he will cover: How to decompose for agility.