Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

CISO

CISO interview with Darren Desmond, the CISO with the Automobile Association in the UK

Philip Ingram (PI) talked to Darren Desmond (DD). Darren currently works with the Automobile Association (AA) in the UK as the Chief Information Security Officer (CISO), joining in 2018. He started his professional career in the British Army's Royal Military Police, before a stint in the Special Investigation Branch, and Military Intelligence.

9 Ways a CISO Uses CrowdStrike for Identity Threat Protection

Identity isn’t a security problem — it’s the security problem. This was the takeaway from my recent meeting with a local government CISO in the Washington, D.C. area. Tasked with protecting infrastructure, including the fire and police departments, the CISO turned to CrowdStrike a year ago for endpoint and identity protection.

What Makes an Effective and Successful CISO?

A CISO (chief information security officer) is a company's senior executive responsible for developing, managing, and implementing its organization’s security program and improving its cybersecurity posture. The CISO oversees the information security programs, protects organizational data and assets, develops IT infrastructures, builds security teams, and handles the overall IT security of the company.

The CISO Role: What Does a Chief Information Security Officer Do?

With the high rate of cyberattacks today, the role of a chief information security officer (CISO) has become more important — and much more visible. Businesses have been forced to invest in guarding their infrastructures, networks and sensitive data. This blog post will take a look at the basics of a CISO, as well as the CISO's main tasks and responsibilities.

How to Improve CISO & Board Member Communication

Here is how to establish successful 2-way communication between the board members and CISOs: Beating the learning curve If you’re a board member, it’s not considered okay if you show up to a meeting without knowing what’s EBITA. But it's perfectly acceptable for you to not know security, which is not good. So it’s your responsibility to educate yourself on cybersecurity. Similarly, CISOs need to learn to express technical things in business language. Seeing the CISO as a true business partner

Budget and momentum are key to cybersecurity automation maturity - and CISOs are feeling left behind

As cyber threats intensify and the human and financial resources available to deal with them remain limited, there is a growing need for automation in cybersecurity. The intelligent automation of key cybersecurity processes can significantly improve an organization’s posture and at the same time support under-pressure employees by reducing reliance on manual processes.

Budget and momentum are key to cybersecurity automation maturity - and CISOs are feeling left behind

As cyber threats intensify and the human and financial resources available to deal with them remain limited, there is a growing need for automation in cybersecurity. The intelligent automation of key cybersecurity processes can significantly improve an organization’s posture and at the same time support under-pressure employees by reducing reliance on manual processes.

A day in the life of a CISO: Chris Hughes of Aquia

One of the most challenging positions within an organization is that of a chief information security officer (CISO). A little while back, I had an opportunity to sit down with Chris Hughes, CISO and co-founder of Aquia, to discuss his experience in the role. Acquia is an open source digital experience company that empowers the world’s most ambitious brands to embrace innovation.

CISO Interview Series: Professor Richard Benham

In the cybersecurity profession, some names stick out among the great creators and contributors. I recently had the opportunity to speak with Richard Benham about the role of a Chief Information Security Officer (CISO). Professor Richard Benham is known globally as a pioneer in the world of Cybersecurity, Artificial Intelligence, and Cyber Warfare.