CISO Edge, The Gartner Cybersecurity Podcast Gartner
-
- Economía y empresa
In CISO Edge, the Gartner Cybersecurity Podcast, VP Analyst Chris Mixter engages Gartner experts and progressive CISOs to help cybersecurity leaders cut through the noise and focus their energy on work that creates value for the enterprise.
-
Want to Be Proactive? Lead With Privacy!
The line between cybersecurity and privacy grows blurrier by the day. Even CISOs who don’t own privacy find themselves devoting time and resources for uncertain returns. In today’s CISO Edge Podcast, we discuss ways that the CISO can maximize their ROI to their organizations’ privacy objectives.
-
CISOs and General Counsel Partner Up to Navigate New SEC Cybersecurity Rules
The U.S. SEC’s new cybersecurity disclosure rules create stress for the entire C-suite. Effective general counsel and CISOs are teaming up to accelerate their organizations past uncertainty and into compliance with these new rules.
-
If You Love Your Cybersecurity Talent, Set It Free
Cybersecurity talent scarcity is driving CISOs to reexamine their workforce management approaches. Counterintuitively, one of the most powerful ways that CISOs can foster a thriving workforce is by professionalizing how they “release” their talent. Learn how in this episode of the CISO Edge Podcast.
-
CISOs, Your Chief Deliverable Is Trust, Not Security!
The intangible nature of a CISO’s responsibilities can lead to a vicious cycle of incident and response, eroding their capacity to resolve issues and lead to burnout and turnover. In this episode of CISO Edge, we discuss the need to make trust as the CISO’s vital deliverable.
-
Wrangling Third Party Cybersecurity Risk
In this episode of the CISO Edge podcast series, Gartner experts Rahul Balakrishnan and Chris Mixter discuss three actions that CISOs must take to improve performance on third-party cyber risk management.
-
Identity-First Security–Are You Ready?
In this episode of the CISO Edge podcast series, Gartner experts Mary Ruddy and Chris Mixter explore what cybersecurity leaders across the spectrum of identity and access management maturity need to do to accelerate their progress to an identity-first cybersecurity program.
Decentralization of computing resources, channels, entities and devices makes traditional perimeter-based security strategies and tools insufficient. Security and risk management leaders must put identity at the core of cybersecurity strategy and invest in continuous, context-aware controls. However, getting to a level of IAM program maturity where you are able to deliver continuous, context-aware identity and access controls at scale feels like a massive leap to many CISOs, whose IAM programs struggle to deliver their basic capabilities at a consistent level of quality. This conversation will provide guidance to CISOs to enable their IAM teams to rapidly advance down the path to identity-first security.