EC-Council CISO News
May 15, 2016
Webinar: Corporate Governance for CISOs: Business Continuity Management

Corporate Governance for CISOs: Business Continuity Management Date: May 17th, 2016 Register to Attend This session focuses on the most important concerns related to business continuity management. CISO isn’t always the leader of an organization’s business resilience efforts, but the CISO offers significant influence to ensure an effective program that[…]

Read More
May 13, 2016
National Cybersecurity Student Association

The National Cybersecurity Student Association is a one-stop-shop to enhance the educational and professional development of cybersecurity students through activities, networking and collaboration. This group supports the cybersecurity educational programs of academic institution, inspires career awareness and encourages creative efforts to increase the number of underrepresented populations in the field.[…]

Read More
May 2, 2016
Webinar: Corporate Governance for CISOs: Asset Management

Corporate Governance for CISOs: Asset Management Date: May 3rd, 2016 Register to Attend This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory[…]

Read More
April 1, 2016
CCISO Program wraps-up successful Washington DC area class

The Certified CISO Program, EC-Council’s executive information security management course, has seen resounding success around the US, presenting four classes in four cities in 2016. Keyaan Williams, EC-Council CCISO Senior Executive, has seen incredible learning take place in these executive classrooms. Feedback from students in the class include mentions of[…]

Read More
February 11, 2016
Conclusive evidence that the CISO should be reporting to the CEO

At past EC-Council Foundation Global CISO Forums and CISO Summits, panels of information security executives have discussed the debate in the industry regarding the proper hierarchical placement of the CISO. The debate is typically framed as being a choice between the CISO reporting to the CIO or to the CEO.[…]

Read More
February 10, 2016
A CISO in the White House – Good News for Security

It’s been widely reported that the White House is expected to hire a CISO to oversee the information security of all federal agencies. In the wake of several high-profile breaches of important federal agencies over the last three years, the Obama administration is looking to fill the CISO position to[…]

Read More
February 9, 2016
Small Businesses, Ransomware, and Your Risk Assessment

An interesting article was published in The Guardian this week detailing the rise of ransomware attacks targeted at small businesses. Small and medium enterprises (SMEs) are enticing targets for ransomware attacks because they typically have fewer security controls in place and are unable to defend against an attack and may[…]

Read More
January 29, 2016
From Manager to C-Level Executive: Here’s what it takes

For many professionals in information security, there comes a time when the promotions stop coming at a predictable pace. For most, this happens at the upper end of middle management. This is the point when simple technical competence is no longer enough to earn the next bump in pay. Something[…]

Read More
September 4, 2015

Not All Network Security is Created Equal Cyber Security Solutions Tailored for Small to Mid-sized Businesses Ensuring data security and regulatory compliance means protecting your small to mid-sized business from the increasing threat of a cyber-attack with cost effective enterprise-class solutions. Protection of critical business networks requires specific cyber security[…]

Read More
August 20, 2015

Gemalto Brings Trust to Every Day Services SafeNet and Gemalto have recently joined forces to create the worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network. Together, we protect more data, transactions, and identities than any other company, delivering[…]

Read More
August 19, 2015

  CounterTack | MCSI is the leading provider of real-time, Big Data endpoint detection and response technology for the enterprise. CounterTack | MCSI provides unprecedented visibility and context around operating system and binary behaviors to detect zero-day attacks, rootkits, targeted malware and advanced persistent threats, enabling our customers to improve[…]

Read More
August 10, 2015
Global CISO Forum Podcast Episode 9: How would you do your job differently if you knew you would be breached?

In this Podcast: On this episode, host Amber Williams sits down with Gary Miglicco, ePlus’ Security Director, to talk about defending perimeters, asset classification, and Gary’s career path. Next, Keith Rayle, Principal at WWT, discusses some infosec current events before the CCISO Study Session. Listen Download this Podcast

Read More
July 30, 2015

CBI manages IT security risk and helps ensure your data is secure, compliant and available. No matter your industry our Subject Matter Experts, tailored assessments and custom solutions help safeguard your organization’s information. Our proven process and CBI Guarantee allows you to prepare, manage and navigate issues that can damage[…]

Read More
July 29, 2015
United States Cybersecurity Magazine

About the United States Cybersecurity Magazine We are the voice for the cybersecurity industry, a forum for those on the front lines of cyber-warfare, cybersecurity law and policy, and cybersecurity infrastructure to inform and instruct the industry and the public at large. We aim to raise the level of awareness[…]

Read More
July 13, 2015
Kaspersky Lab

Kaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions. Throughout its 15-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for consumers, SMBs and Enterprises. Kaspersky Lab has over 2,500 employees, including more than 800 research and development[…]

Read More
July 7, 2015
Greatbay Software

Great Bay Software Great Bay Software’s Beacon suite provides advanced endpoint security and supports a full spectrum of your network initiatives. Beacon helps you identify every endpoint attached to your network, monitor behavior in real-time and enforce access control on your network. Take back control of your network today. Beacon[…]

Read More
July 7, 2015

Cybereason was founded in 2012 by a team of ex-military cybersecurity experts to revolutionize detection and response to cyber attacks. The Cybereason Detection and Response platform uniquely identifies both known and unknown threats in real time using big data, behavioral analytics and machine learning, and puts them in context to[…]

Read More
July 7, 2015
Cengage Learning

Cengage Learning is a leading educational content, software and services company for the K12, higher education, professional and library markets with operations in more than 20 countries around the world. The company provides superior content, personalized services and course-driven digital solutions that accelerate student engagement and transform the learning experience.[…]

Read More
July 7, 2015
Insider Threat Report

Fill this form out to receive your Insider Threat Report: The Ten Steps to Thwarting the Insider Threat Whitepaper.Name* First Last Email* Phone*Address* Street Address City State / Province / Region ZIP / Postal Code AfghanistanÅland IslandsAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei[...]

Read More