How do cybersecurity and executive leaders communicate about ransomware? A new (ISC)² study provides insights for cybersecurity professionals into the minds of C-suite executives and how they perceive their organizations’ readiness for ransomware attacks.
Insurance providers have had to take on increased risk with ransomware attacks on the rise, thus the surging price of insurance premiums. What are some trends fueling the cyber insurance industry?
The NTT 2021 Global Workforce Report found disparities between C-suite and operations staff perceptions of remote and in-person work, as well as the level of employee satisfaction in their organizations.
It’s vital for C-suites to include cybersecurity as part of their capital planning. And the key to that is determining what “just enough security” is for the organization to meet its business goals. What’s the best way to determine how much security is “just enough”?
Nearly all U.S. executives (98%) report that their organizations experienced at least one cyber event in the past year, compared to a slightly lower rate of 84% in non-U.S. executives, according toDeloitte’s 2021 Future of Cyber Survey.
In this installment of the Cybersecurity and Geopolitical Podcast, Ian Thornton-Trump (CISO at Cyjax) and Tristan de Souza retrospectively look at the inaugural International Cyber Expo in London, discussing data breaches, the role of a CISO and more.
At the Raines Cybersecurity Leadership webinar, cyber expert Elad Yoran discussed the essential traits of a CISO and why businesses should incorporate a security voice in their boardroom.
Decision-makers need to strike a balance when it comes to spending on cybersecurity technology in a way that still enables corporate growth without leaving the organization overly vulnerable to an attack. Invest too little, and there could be gaps in your cyber defenses. Invest too much, and there could be a false sense of security.
A new global survey of C-level executives released by CloudBees, reveals high confidence levels in software supply chain security but a limited understanding of the essential components that make a software supply chain secure.