As cloud computing, DevOps and automation continue to evolve, the lines between IT functions are fading, making security integral to these processes. Hiren Dave, CIO and CISO at Essen Health Care, shares how combining the roles of CIO and CISO improves risk management and communication.
The CrowdStrike outage exposed recovery challenges, highlighting cloud systems' resilience over physical infrastructure. Jonathan Hatzor, co-founder and CEO of Parametrix, advises CIOs and CISOs on strategies that can effectively manage, mitigate and transfer risks.
Mike Fey, Co-Founder & CEO of Island, highlights how the enterprise browser's adoption has surged across sectors. He delves into new use cases, including resilience, healthcare and inter-company collaboration, emphasizing the importance of security and productivity in dynamic environments.
Global CIOs said the fallout from the CrowdStrike outage could have been mitigated by investing in comprehensive data resilience that can help restore corrupted data through orchestrated recovery. It can help recover from disasters such as ransomware, data corruption and catastrophic events.
At RSAC 2024, Keyfactor and Devo assembled a panel of CISOs for an engaging roundtable discussion on a variety of important topics for CISOs and other senior-level security professionals. This panel of seasoned CISOs dives into the biggest challenges facing the position, and how they're overcoming those challenges in...
Welcome to Google Cloud's Cybersecurity Edition of the First Annual Generative AI Survey, brought to you by Information Security Media Group (ISMG). This survey of over
400 business and cybersecurity professionals conducted in
H2 2023 comprises responses from two groups, business
leaders – comprising CIOs, board...
Business leaders and security leaders agree on
the importance of cybersecurity, but there are
significant differences in how the two groups
perceive and prioritize the threats and view the
role of the other party.
In H2 2023, Google Cloud partnered with Information Security Media Group (ISMG) and surveyed 343 senior executives at major
enterprises globally, divided into two groups of respondents:
cybersecurity professionals and executive board members who
are not cybersecurity professionals, to compare and contrast
their...
Experience this captivating interview featuring David Bradley, Vice President of Consulting Services at Clearwater Security, as he provides in-depth analysis on the current state of generative AI trends in the healthcare industry.
Clarke Rodgers, director of enterprise strategy with AWS, explores the realm of generative AI and its role in cyber risk management. In an interview with ISMG, he shares insights into navigating regulatory impacts and leveraging AI-driven security automation for compliance.
By the numbers, who has implemented GenAI in their organization? Who has a dedicated budget? And who understands the AI regulations for their industry? An expert panel discusses the findings of ISMG's First Annual Generative AI Study: Business Rewards vs. Security Risks.
Make no mistake, beyond all the hype, widespread availability of generative AI is a revolution impacting us all and fundamentally changing how we do business...let alone, communicate. In every revolution there are winners and losers, and there is no opt-out if we want to avoid being left behind by our...
Compromised mobile apps can be an open door to critical
enterprise app servers and other back-end systems,
and this survey aims to shine a light on a potential hole in
most enterprise security walls – exposing potential gaps in
CISO awareness.
Compromised mobile apps can be an open door to critical enterprise app servers and other back-end systems, and this survey aims to shine a light on a potential hole in most enterprise security walls – exposing potential gaps in CISO awareness.
In Q2 & Q3 2023, ISMG surveyed over 100 senior cybersecurity...
Shifting from encryption, threat actors are now resorting to data exfiltration to exert pressure on enterprises, demanding ransom for the protection of valuable data and reputation. CIOs and CISOs must disrupt the playing field by deploying deception and embracing other innovative methods.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cio.inc, you agree to our use of cookies.