No Respect.Chief Information Security Officers Misunderstood and Underappreciated by Their C-Level Peers

Despite their rising profile in recent years, Chief Information Security Officers (CISOs) still face a long climb in gaining the respect of many C-level executives. There is a prevailing notion that CISOs are primarily a scapegoat for security breaches, have not earned a seat at the senior leadership table and are unlikely to succeed in a leadership role outside of information security. A ThreatTrack Security survey of 203 C-level executives at U.S.-based enterprises employing a CISO revealed that 44% of C-level executives believe CISOs “should be accountable for any organizational data breaches,” but 54% believe CISOs should not be responsible for cybersecurity purchasing decisions. In other words, while CISOs deserve the blame for breaches in the minds of many executives, they should have limited say in acquiring the technology and resources to prevent them.

Spotlight

Proactive Data Systems Pvt. Ltd

Proactive Data Systems is a Focused Network System Integrator including Cabling, Network Foundation Technologies such as Switching and Routing; Unified Communications, Security and Wireless. We have support locations at NCR, Bangalore, Chennai and Pune. We are holding Advanced Architecture Specialisations from Cisco in Unified Communications, Security and Wireless.

OTHER WHITEPAPERS
news image

The ‘Zero Trust’ Model in Cybersecurity: Towards understanding and deployment

whitePaper | August 24, 2022

In the last couple of years, “zero trust” has gained significant traction in the cybersecurity realm as a means to protect networks and increase security across organizations. In part, the growing popularity of this security model can be attributed to the shift to hybrid working practices that call for a more secure work environment whether on- or off-premises.

Read More
news image

The Ethics and Security of Cloud Computing

whitePaper | October 17, 2022

Nearly four thousand years ago, Hammurabi engraved the laws of Babylon onto a stone plinth and revolutionized the codication of law. Today, lawyers of all walks of life are engaged in a new revolution, with the ability to practice law armed with nothing more than a tablet device and an internet browser—a revolution brought about, in large part, by the rise of cloud computing.

Read More
news image

Cloud-Native Ransomware – How attacks on availability leverage cloud services

whitePaper | December 13, 2022

Ransomware is a financially motivated crime with the goal of inhibiting business systems and obtaining a ransom payment. Historically, ransoming data residing in traditional on-premises enterprise workloads and government systems have resulted in ample financial gain for assailants using ransomware attacks.

Read More
news image

Autodesk® Fusion 360 Security Whitepaper

whitePaper | October 27, 2022

Autodesk® Fusion 360™ is the first 3D CAD, CAM, and CAE tool of its kind. It connects your product development process in a single cloud-based platform that works on both Mac and PC. The Fusion 360 tools enable fast and easy exploration of design ideas with a secure and integrated concept-to-fabrication toolset that extends to include web browsers and mobile devices.

Read More
news image

N-able N-central Security White Paper

whitePaper | June 22, 2023

As an integral component of your IT management system, N-able N-central® complements an organization’s existing security policies and infrastructures. N-able N-central consists of a number of components that were specifically designed to provide flexibility as well as to ensure the integrity of the security of the networks on which N-able Ncentral operates.

Read More
news image

The Trusted Data Security Solution for Cyber Recovery

whitePaper | December 30, 2022

Digital transformation has brought significant benefits to organizations, including increased agility and flexibility, but it has also led to a rise in cyber attack vectors. 66% of organizations were hit with ransomware within the last year, according to a 2022 Sophos survey. The widespread adoption of cloud services and Software-as-aService (SaaS) applications has expanded the attack surface, making it more challenging to manage and secure data. Additionally, the increased use of mobile devices and remote work have made it easier for cybercriminals to launch attacks from anywhere, at any time.

Read More

Spotlight

Proactive Data Systems Pvt. Ltd

Proactive Data Systems is a Focused Network System Integrator including Cabling, Network Foundation Technologies such as Switching and Routing; Unified Communications, Security and Wireless. We have support locations at NCR, Bangalore, Chennai and Pune. We are holding Advanced Architecture Specialisations from Cisco in Unified Communications, Security and Wireless.

Events