article thumbnail

Can you have too many security tools?

CIO

A member of your organization’s security team reads about a new kind of security tool and brings it to the CISO’s attention, who decides that it’s a good investment. The CISO sees a new kind of security threat that requires a different security tool. A colleague recommends a security tool she says is indispensable.

Security 468
article thumbnail

Security team management: Top 4 findings from discussions with CISOs

CIO

Most large businesses have a security team. But what, exactly, does that security team look like? And is it optimized in each of these respects to maximize the organization’s security posture? We learned, for example, that very few organizations have just a single security team. How is it structured? Most have several.

Security 459
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Need a security road map? Ditch the ad hoc measurement

CIO

CISOs can only know the performance and maturity of their security program by actively measuring it themselves; after all, to measure is to know. With proactive measurement, CISOs will confirm how well their security program performs, better understand its preparedness against relevant threats, and highlight gaps that require improvement.

Security 418
article thumbnail

The evolving role of security and IT in DR and incident response

CIO

However, as ecommerce has proliferated, security threats have increased, elevating cybersecurity to a board-level concern. This has resulted in some overlaps between security standards and frameworks and IT, which, if not managed effectively, can ruin the company’s ability to respond.

Security 416
article thumbnail

Global AI regulations: Beyond the U.S. and Europe

CIO

China follows the EU, with additional focus on national security In March 2024 the Peoples Republic of China (PRC) published a draft Artificial Intelligence Law, and a translated version became available in early May. The UAE provides a similar model to China, although less prescriptive regarding national security.

article thumbnail

Solving the tech debt problem while staying competitive and secure

CIO

Looking ahead to the next 12-18 months, two top priorities emerge for IT leaders: developing a strong business case for AI infrastructure spending (cited by 35% of respondents to IDC’s Future Enterprise Resiliency and Spending Survey, Wave 3 , March 2024) and increasing cyber resilience and security (34%).

Security 370
article thumbnail

How to Build Security and Resilience into Your Digital Transformation

CIO

2] 451 Research, part of S&P Global Market Intelligence; Source: Voice of the Enterprise: Storage, Data Management and Disaster Recovery 2021. [3] And the problem can’t be ignored. What’s the answer to coping with the dynamic nature of risks? Find more about it here. [1]

Security 365