Cygilant Blog

Here Are the Skills You Need to Be a Chief Information Security Officer

Posted by Vijay Basani on Jun 29, 2016


The position of Chief Information Security Officer (CISO) is a crucial one within an organization, as the role calls for "superhero"-like responsibilities. CISOs are the executives responsible for stopping the thousands of hackers who may be out there attempting to breach businesses around the clock. To accomplish this challenging work, CISOs will be best equipped if they bring the following three types of skills to the job.

The CISO: Today’s Modern-day Cybersecurity Superhero?

Posted by Shawn O'Brien on Feb 24, 2016


What exactly are the qualifications for being a superhero? Super-strength? Super-speed? The ability to fly? Or can a superpower be as simple as protecting the innocent from criminals? Simply put, the answer is “Yes,” which makes CISOs modern-day cybersecurity superheroes! After all, they hide in plain sight, working behind the scenes to protect innocent people from villainous cyber criminals whose sole purpose is to steal and cause harm to others.


Executive Roles in Data Breaches

Posted by Vijay Basani on Oct 8, 2014


 A study by Experian Data Breach Resolution and the Ponemon Institute found that data breaches are increasing in frequency, but “current data breach preparedness programs often fail to deal with all consequences of an incident.” The report also said that 72% of organizations have a data breach response team, but only 30% of respondents believed that their organizations were effective in developing and executing a data breach plan.” The plans aren’t effective because they’re not reviewed and updated in an adequate and relevant timeframe. Companies understand the importance of having a data breach response plan and team in place, but they still need to work on getting executives involved. Executives can serve as people who centralize control over a data breach response team.


From Cyber Attacks to Actionable Intelligence

Posted by Security Steve on Apr 14, 2014

Have you ever considered the average amount of money that enterprises have spent in the past 12 months to resolve the impact of exploits? The answer might surprise you: $10 million.  And if they had actionable intelligence about cyber attacks within 60 seconds of a compromise? An of average $4 million in savings. These numbers come from Ponemon Institute’s latest research findings, Live Threat Intelligence Impact Report 2013.

Helping a CISO determine its organization’s level of vulnerability

Posted by Security Steve on Apr 15, 2013

There are two types of vulnerabilities: those you know about and those you don’t. Finding the former is relatively easy; regular, consistent vulnerability scanning will tell you what you’re able to know. Vulnerability scanning for medium-to-large sized organizations is something that should be done on a continuous basis, and should rely on both internal personnel, and external organizations that can usually bring a fresh perspective to asset identification and scanning.

Most Recent Posts

Subscribe to Email Updates