How to write a CISO job description

Email not displaying correctly? View it in your browser.

CSO

CSO Salted Hash

Jan 12, 2018
Featured Image

5 mistakes I’ve made (and how to avoid them)

Pulling from his years of building programs for The Walt Disney Company & Sony Pictures, Jason Hoenich shares his own mistakes building security awareness and provides guidance on how to avoid them in your own security awareness programs. Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

How to write a CISO job description
Get 33% Off H&R Block's Federal & State Tax Software, Plus a 5% Amazon Bonus
Research suggests cybersecurity skills shortage is getting worse
Demand for cybersecurity talent rises sharply
How hackers crack passwords and why you can't stop them
The 6 best password managers

White Paper: Software AG Inc

Connected Manufacturing: An IoT Enabled Revolution in Manufacturing

The Internet of Things (IoT) has potential far beyond operational cost savings. It will be the foundation for new 'smart' products and services. Read More

Thumbnail Image
INSIDER

How to write a CISO job description

The chief information security officer has a big, mission critical job. Make sure you spell out the CISO's duties and expectations for the role. Read More

Thumbnail Image
DealPost

Get 33% Off H&R Block's Federal & State Tax Software, Plus a 5% Amazon Bonus

H&R Block's software will guide you through your unique tax situation to make sure everything is accounted for. This version handles both Federal and State returns and is currently discounted 33% with a potential 5% Amazon cash bonus. Read More

Thumbnail Image

Research suggests cybersecurity skills shortage is getting worse

New data reveals growing skills gaps that represent an existential threat. What should organizations do? Read More

Thumbnail Image

Demand for cybersecurity talent rises sharply

Three experts share their thoughts on how to address the biggest cyber threat of all — the rapidly increasing cybersecurity workforce shortage. Read More

Thumbnail Image
INSIDER

How hackers crack passwords and why you can't stop them

Password crackers have access to more stolen passwords and better password hacking software and tools than ever before. Read More

Thumbnail Image

The 6 best password managers

Look to these top password managers for Windows, MacOS, iOS and Android to make your online life easier and more secure. Read More

White Paper: Software AG Inc

The Case for Connected Manufacturing

Manufacturing exists in a state of constant pressure: to optimize operations and supply chains, to turn IT into a digital revenue generator and to deliver - in some new way - something that will wow customers. The problem for many manufacturing CIOs is that they have already done all the obvious things to achieve the improvements and optimizations they seek. Read More

CSO Insider

1. 5 top machine learning use cases for security
2. Security platform or best of breed? There’s only one answer
3. Is source code inspection a security risk? Maybe not, experts say
4. Crossbow offers live fire cybersecurity vulnerability testing
5. Data breached in translation

Editor's Picks

1. Spectre and Meltdown: What you need to know going forward
2. Password managers grow up, target business users
3. How 3 innovative products approach network security
4. 17 steps to being completely anonymous online
5. The dirty dozen: 12 top cloud security threats for 2018
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Salted Hash as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright © 2018 CSO Online, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an email to newsletters@idg.com.