Thursday, March 4, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

All CISOs must be transformational

May 10, 2020
in Internet Security
All CISOs must be transformational
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

In January 2020, we launched our inaugural “The Future Of The CISO” report, which identified the six types of CISOs (chief information security officers) we discovered through our research. At its release, we received copious amounts of feedback — some we had considered and some we hadn’t. While we were conducting our research, however, the omnipresent event we know today — COVID-19 — had yet to occur. 

COVID-19 has changed the security landscape for CISOs: employees working remotely off non-work-provided devices, data flowing haphazardly, and strategic plans disintegrating. Therefore, while the six types still exist, my colleague, Josh Zelonis, pointed out that now “every CISO is now a transformational CISO.” 

You might also like

High severity Linux network security holes found, fixed

Google takes next steps towards ‘privacy-first’ web devoid of third-party cookies

Ursnif Trojan has targeted over 100 Italian banks

Despite the internal friction when you’re changing leadership style, it’s imperative for security leaders to step out of their comfort zones and adapt to current circumstances. CISOs should: 

  • Lead with empathy. Empathy should be the foundation of your approach to leadership. With external and internal pressures colliding, Rick Holland, CISO of Digital Shadows, points out that “empathy is [a] top [interpersonal skill] for me.” 
  • Learn to thrive in chaos. Release your grip on control and instead adapt to current circumstances to help your organization survive this volatile time. 
  • Just say yes. Don’t stress over the short-term imperfections of your current security program’s state and focus more on how you can make quick wins and other things “just work.” 
  • Recognize the strength of vulnerability. Humanizing yourself to your team will alleviate employee stress. Extending yourself to like-minded peers can reassure you that you’re not alone, energizing your confidence that you’re doing what’s right “right now.” 

This post was written by VP and Principal Analyst Jeff Pollard, and it originally appeared here. 


Credit: Zdnet

Previous Post

IonQ CEO Peter Chapman on how quantum computing will change the future of AI

Next Post

Understanding The Recognition Pattern Of AI

Related Posts

High severity Linux network security holes found, fixed
Internet Security

High severity Linux network security holes found, fixed

March 4, 2021
Google takes next steps towards ‘privacy-first’ web devoid of third-party cookies
Internet Security

Google takes next steps towards ‘privacy-first’ web devoid of third-party cookies

March 4, 2021
Ursnif Trojan has targeted over 100 Italian banks
Internet Security

Ursnif Trojan has targeted over 100 Italian banks

March 4, 2021
Microsoft account hijack vulnerability earns bug bounty hunter $50,000
Internet Security

Microsoft account hijack vulnerability earns bug bounty hunter $50,000

March 3, 2021
Malaysia Airlines suffers data security ‘incident’ spanning nine years
Internet Security

Malaysia Airlines suffers data security ‘incident’ spanning nine years

March 3, 2021
Next Post
Understanding The Recognition Pattern Of AI

Understanding The Recognition Pattern Of AI

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

High severity Linux network security holes found, fixed
Internet Security

High severity Linux network security holes found, fixed

March 4, 2021
A $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account
Internet Privacy

A $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account

March 4, 2021
Deno 1.8 preps for GPU-accelerated machine learning
Machine Learning

Deno 1.8 preps for GPU-accelerated machine learning

March 4, 2021
3 Types of Image Segmentation. If you are getting started with Machine… | by Doga Ozgon | Feb, 2021
Neural Networks

3 Types of Image Segmentation. If you are getting started with Machine… | by Doga Ozgon | Feb, 2021

March 4, 2021
How to Get More Marketing-Qualified Leads
Marketing Technology

How to Get More Marketing-Qualified Leads

March 4, 2021
Six courses to build your technology skills in 2021 – IBM Developer
Technology Companies

Why developers should centralize their security – IBM Developer

March 4, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • High severity Linux network security holes found, fixed March 4, 2021
  • A $50,000 Bug Could’ve Allowed Hackers Access Any Microsoft Account March 4, 2021
  • Deno 1.8 preps for GPU-accelerated machine learning March 4, 2021
  • 3 Types of Image Segmentation. If you are getting started with Machine… | by Doga Ozgon | Feb, 2021 March 4, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates