10,658 Results for:Information security program management

  • Sort by: 

Information security certification guide: Specialized certifications

By Ed Tittel 06 Feb 2018

This information security certification guide looks at vendor-neutral certifications in specialized areas such as risk management, security auditing and secure programming. Read More

Greg Temm

Greg Temm is chief information risk officer for the Financial Services – Information Sharing and Analysis Center (FS-ISAC). Temm is responsible for the overall global intelligence and risk management program of FS-ISAC and serves as a trusted security advisor in sales, marketing and member engagement for the company around the globe.Read More

What does a CISO do now? It's a changing, increasingly vital role

04 Oct 2017

What does a CISO do in this day and age? The responsibilities of a chief information security officer, the senior executive responsible for an organization's information security program, are growing dramatically. ... Read More

How to shore up your third-party risk management program

By Kevin Beaver 23 Sep 2019

A third-party risk management program has to go beyond questionnaires and poorly designed policies. Learn what you should do to protect yourself against vendor security flaws and core risks. Read More

How to use SOAR tools to simplify enterprise infosec programs

By Katie Donegan 25 Sep 2019

SOAR tools are designed to deliver convenience and simplicity to cybersecurity programs. Explore the many benefits security orchestration and automation promises users. Read More

Cybersecurity and business continuity integration boosts resilience

By Paul Kirvan 10 Sep 2019

Are you doing all you can to make your organization resilient? You might be hampering your company's efforts by keeping business continuity and cybersecurity planning separate. Read More

How to get management interested in an information security program

By Shon Harris 05 Jan 2007

When it comes to firing up an information security program, are your execs sitting on their hands? In this expert Q&A, security management pro Shon Harris reveals how to speak the language of senior management. Read More

Josh Sokol

National Instruments

Josh Sokol, CISSP, is the information security program owner at National Instruments, where he manages all compliance, security architecture, risk management and vulnerability management activities.Read More

What are the best criteria to use to evaluate cloud service providers?

By Nick Lewis 09 Sep 2019

Many cloud providers are tight-lipped about internal security control details. Learn how to evaluate cloud security providers with certifications and third-party assessments. Read More

Fitting cybersecurity frameworks into your security strategy

By Joseph Granneman 01 Aug 2019

Whatever an organization's culture, effective use of a security framework requires understanding business goals and program metrics, and demands leadership communication. Read More