Tuesday, June 6, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

CISOs, Board Members and the Search for Cybersecurity Common Ground

Researcher by Researcher
October 21, 2022
in Cybersecurity
0
Hybrid Workforces Face Unique Phishing Challenges
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Making the Connection in the Boardroom

A lack of effective communication is one driver for this gap around how cybersecurity is understood. According to Proofpoint’s report, 69 percent of board members say they see eye-to-eye with their CISOs, and only 51 percent of CISOs feel the same way.

Phil Venables, CISO and vice president of Google Cloud, at the mWise event on Tuesday acknowledged “there’s a little bit of fear in the boardrooms that cyber is this dark mysterious art that is really difficult to manage.”

CISOs and board members can achieve a better mutual understanding not from using technical terms, but instead looking at what these terms mean for the business; such as how security threats and flaws can potentially impact organizational business goals and reputation. Board members care less about threat detection metrics and more about how these metrics will impact revenue, for instance.

Venables said that approaching boardroom communications from a risk-based perspective, rather than a technical perspective, can help drive further collaboration between CISOs and board members. CISOs could ask boards to think about the risks facing an organization’s most critical assets and services, the effectiveness of the controls that mitigate those risks and the end-to-end processes in place to constantly validate that these risks are being monitored, he said.

“Now in that whole paragraph, I never used the word technology, I didn’t use cyber, I didn’t use information security,” said Venables. “That’s just the approach that boards have to manage a whole array of risks… and the more boards can get used to that, the more security teams can answer that question in a coherent way. Today, they’re not doing a great job of answering that question and the boards are not doing a great job of holding the security and technology and risk teams accountable for that question.”



Source link

Related articles

Sentra Raises $30 Million for DSPM Technology

Dozens of Malicious Extensions Found in Chrome Web Store

June 6, 2023
Learn how to protect your company from cyberattacks for just $46

Learn how to protect your company from cyberattacks for just $46

June 5, 2023
Tags: BoardCISOscommonCybersecuritygroundmemberssearch
Share76Tweet47

Related Posts

Sentra Raises $30 Million for DSPM Technology

Dozens of Malicious Extensions Found in Chrome Web Store

June 6, 2023
0

Security researchers recently identified more than 30 malicious extensions that had made their way into the Chrome web store, potentially...

Learn how to protect your company from cyberattacks for just $46

Learn how to protect your company from cyberattacks for just $46

June 5, 2023
0

Cloud computing brings many business benefits, but it’s essential to know how to protect your data and operations. Image: StackCommerce...

Decipher Podcast: Hazel Burton | Decipher

Decipher Podcast: Hazel Burton | Decipher

June 5, 2023
0

Podcast Ransomware Task Force Ransomware Decipher Podcast: Megan Stifel Returns Megan Stifel, chief strategy officer for the Institute for Security...

Sentra Raises $30 Million for DSPM Technology

Galvanick Banks $10 Million for Industrial XDR Technology

June 5, 2023
0

Galvanick, an early-stage startup working on an Extended Detection & Response (XDR) platform for industrial infrastructure, has scored $10 million...

How to know what personal information Microsoft Edge knows about you

How to know what personal information Microsoft Edge knows about you

June 5, 2023
0

Users should be aware of what personal data is being collected and stored by Microsoft Edge and be prepared to...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Support for these Microsoft enterprise products ends in 2023

Support for these Microsoft enterprise products ends in 2023

June 6, 2023
Sentra Raises $30 Million for DSPM Technology

Dozens of Malicious Extensions Found in Chrome Web Store

June 6, 2023
Pepper Advantage Obtains Fintech Licence in Indonesia

Pepper Advantage Obtains Fintech Licence in Indonesia

June 6, 2023
Learn how to protect your company from cyberattacks for just $46

Learn how to protect your company from cyberattacks for just $46

June 5, 2023

Recent Posts

Support for these Microsoft enterprise products ends in 2023

Support for these Microsoft enterprise products ends in 2023

June 6, 2023
Sentra Raises $30 Million for DSPM Technology

Dozens of Malicious Extensions Found in Chrome Web Store

June 6, 2023
Pepper Advantage Obtains Fintech Licence in Indonesia

Pepper Advantage Obtains Fintech Licence in Indonesia

June 6, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • LetsAskBinuBlogs
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software Stories TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved