The recent Twitter hack shows that companies must continue to bolster the most critical part of their security infrastructure—their workforce. While cybersecurity professionals have been sounding the alarm about the threat of social engineering for a while, most cybersecurity programs focus on the technical aspects of the job—securing a company's systems and products.
Will Houston joins Steve Durbin, managing director of the Information Security Forum, for an episode of the ISF Podcast focusing on “The Effect of a Breach on a CISO’s Value.” They discuss the skills shortage, the effect of a breach on a CISO’s value and employability, and more.
How the C-suite and Board can partner with the CISO to create stronger, more resilient organizations.
In December 2017 Egon Zehnder held a Cybersecurity Roundtable Discussion in Hong Kong, moderated by Richard Lin and Matthew Edwards, consultants in our Technology Officers and Fintech practices.
The pros and cons for seven different CISO reporting structure options.
In what we are calling the Cyber Century, the first signs of danger appear on a screen; a hack, a viral video, a tweet. Any of these can be the opening shot of a bruising battle that can quickly escalate to a crisis.
The challenges and opportunities facing GCs in Greater China
After transitioning from technical guru to core senior leader, the chief information security officer (CISO) role is evolving to embrace information risk, writes Egon Zehnder consultant Kal Bittianda in Security Roundtable.
Attracting and Retaining Top Cyber Security Talent
The combination of data ubiquity, decentralized control and sophisticated new underworld actors presents organizations with a perfect storm to be confronted by their information security leadership.
You are switching to an alternate language version of the Egon Zehnder website. The page you are currently on does not have a translated version. If you continue, you will be taken to the alternate language home page.
Continue to thewebsite