The need for a security leader revealed through cyber insurance

Email not displaying correctly? View it in your browser.

CSO

CSO Update

May 25, 2017
Featured Image

What security leaders need before applying intelligence to cyber

John Boling lines up for a Security Slapshot on how security leaders can successfully apply intelligence to avoid failure Read More

Twitter Facebook LinkedIn

Your Must-Read Stories

The need for a security leader revealed through cyber insurance
Mining the Minecraft generation
New CISO Chris McDaniels to help drive Mosaic451’s cybersecurity practice
Wannacry or Wannabrag? Educating the board on why

Video/Webcast: Veritas

365 Days and Counting... Your Playbook for Accelerating GDPR Readiness

The countdown has started - the General Data Protection Regulation (GDPR) takes effect May 25, 2018. Are you ready? Hear what organizations of all sizes are doing to prepare themselves to get GDPR-ready. Attend this 25-minute roundtable for clear guidance on building a strong GDPR strategy for your organization. Read More

Thumbnail Image
INSIDER

The need for a security leader revealed through cyber insurance

A risk manager explains how learning about cyber insurance drove the creation of the CISO position and key changes across the business Read More

Thumbnail Image

Mining the Minecraft generation

New ways to approach and fill the jobs skills gap Read More

Thumbnail Image

New CISO Chris McDaniels to help drive Mosaic451’s cybersecurity practice

The US Air Force veteran brings deep experience in cyber defense and emergency response. Read More

Thumbnail Image

Wannacry or Wannabrag? Educating the board on why

Recent media attention on the Wannacry incident provides the opportunity for information security managers to demonstrate what they did right and how management decisions (and investments) directly impacted how the organization was able to defeat evolving attacks. Read More

White Paper: Everbridge

Improve IT Operational Response With Automation

In the digital economy, IT service disruptions can cost businesses a fortune! Thus it's critical that enterprises have in place the tools and processes necessary to detect issues, identify the source, and initiate remediation as quickly as possible. This tech dossier explains how automation of the operational response process can help enterprises minimize downtime of mission-critical business applications and services. Read More

Top 5 Stories

1. Microsoft patches Windows XP and Server 2003 due to WannaCrypt attacks
2. Dealing with WannaCry on Monday morning, and the days ahead
3. Did Kaspersky step in dog-doo?
4. Paying the WannaCry ransom will probably get you nothing, here's why
5. Vendors approve of NIST password draft

Editor's Picks

1. 15 hot, new security and privacy apps for Android and iOS
2. How to get creative with your penetration testing
3. 5 security bolstering strategies that won't break the bank
4. What's wrong with this picture? The NEW clean desk test
5. Inside an attack by the Syrian Electronic Army
Twitter Facebook LinkedIn Google+

You are currently subscribed to CSO Update as newsletter@newslettercollector.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn more about INSIDER

Copyright (C) 2017 CSO Online Media Group, 492 Old Connecticut Path, Framingham, MA 01701

Please do not reply to this message.
To contact someone directly, send an e-mail to online@csoonline.com.