EC-Council CISO News
Webinar: Corporate Governance for CISOs: Asset Management

Corporate Governance for CISOs: Asset Management Date: May 3rd, 2016 Register to Attend This session will focus on some fundamental concerns that an organization must address to support an effective information security program. How do you identify asset owners? What are examples of effective classification strategies? What type of inventory[…]

Read More
CCISO Program wraps-up successful Washington DC area class

The Certified CISO Program, EC-Council’s executive information security management course, has seen resounding success around the US, presenting four classes in four cities in 2016. Keyaan Williams, EC-Council CCISO Senior Executive, has seen incredible learning take place in these executive classrooms. Feedback from students in the class include mentions of[…]

Read More
Conclusive evidence that the CISO should be reporting to the CEO

At past EC-Council Foundation Global CISO Forums and CISO Summits, panels of information security executives have discussed the debate in the industry regarding the proper hierarchical placement of the CISO. The debate is typically framed as being a choice between the CISO reporting to the CIO or to the CEO.[…]

Read More
A CISO in the White House – Good News for Security

It’s been widely reported that the White House is expected to hire a CISO to oversee the information security of all federal agencies. In the wake of several high-profile breaches of important federal agencies over the last three years, the Obama administration is looking to fill the CISO position to[…]

Read More
Small Businesses, Ransomware, and Your Risk Assessment

An interesting article was published in The Guardian this week detailing the rise of ransomware attacks targeted at small businesses. Small and medium enterprises (SMEs) are enticing targets for ransomware attacks because they typically have fewer security controls in place and are unable to defend against an attack and may[…]

Read More
From Manager to C-Level Executive: Here’s what it takes

For many professionals in information security, there comes a time when the promotions stop coming at a predictable pace. For most, this happens at the upper end of middle management. This is the point when simple technical competence is no longer enough to earn the next bump in pay. Something[…]

Read More
DataPath

Not All Network Security is Created Equal Cyber Security Solutions Tailored for Small to Mid-sized Businesses Ensuring data security and regulatory compliance means protecting your small to mid-sized business from the increasing threat of a cyber-attack with cost effective enterprise-class solutions. Protection of critical business networks requires specific cyber security[…]

Read More
SafeNet

Gemalto Brings Trust to Every Day Services SafeNet and Gemalto have recently joined forces to create the worldwide leader in enterprise and banking security from core data protection to secure access at the edge of the network. Together, we protect more data, transactions, and identities than any other company, delivering[…]

Read More
CounterTack

  CounterTack | MCSI is the leading provider of real-time, Big Data endpoint detection and response technology for the enterprise. CounterTack | MCSI provides unprecedented visibility and context around operating system and binary behaviors to detect zero-day attacks, rootkits, targeted malware and advanced persistent threats, enabling our customers to improve[…]

Read More
Global CISO Forum Podcast Episode 9: How would you do your job differently if you knew you would be breached?

In this Podcast: On this episode, host Amber Williams sits down with Gary Miglicco, ePlus’ Security Director, to talk about defending perimeters, asset classification, and Gary’s career path. Next, Keith Rayle, Principal at WWT, discusses some infosec current events before the CCISO Study Session. Listen Download this Podcast

Read More
CBI

CBI manages IT security risk and helps ensure your data is secure, compliant and available. No matter your industry our Subject Matter Experts, tailored assessments and custom solutions help safeguard your organization’s information. Our proven process and CBI Guarantee allows you to prepare, manage and navigate issues that can damage[…]

Read More
United States Cybersecurity Magazine

About the United States Cybersecurity Magazine We are the voice for the cybersecurity industry, a forum for those on the front lines of cyber-warfare, cybersecurity law and policy, and cybersecurity infrastructure to inform and instruct the industry and the public at large. We aim to raise the level of awareness[…]

Read More
Kaspersky Lab

Kaspersky Lab is the world’s largest privately held vendor of endpoint protection solutions. Throughout its 15-year history Kaspersky Lab has remained an innovator in IT security and provides effective digital security solutions for consumers, SMBs and Enterprises. Kaspersky Lab has over 2,500 employees, including more than 800 research and development[…]

Read More
Greatbay Software

Great Bay Software Great Bay Software’s Beacon suite provides advanced endpoint security and supports a full spectrum of your network initiatives. Beacon helps you identify every endpoint attached to your network, monitor behavior in real-time and enforce access control on your network. Take back control of your network today. Beacon[…]

Read More
Cybereason

Cybereason was founded in 2012 by a team of ex-military cybersecurity experts to revolutionize detection and response to cyber attacks. The Cybereason Detection and Response platform uniquely identifies both known and unknown threats in real time using big data, behavioral analytics and machine learning, and puts them in context to[…]

Read More
Cengage Learning

Cengage Learning is a leading educational content, software and services company for the K12, higher education, professional and library markets with operations in more than 20 countries around the world. The company provides superior content, personalized services and course-driven digital solutions that accelerate student engagement and transform the learning experience.[…]

Read More
Insider Threat Report

Fill this form out to receive your Insider Threat Report: The Ten Steps to Thwarting the Insider Threat Whitepaper.Name* First Last Email* Phone*Address* AfghanistanAlbaniaAlgeriaAmerican SamoaAndorraAngolaAnguillaAntarcticaAntigua and BarbudaArgentinaArmeniaArubaAustraliaAustriaAzerbaijanBahamasBahrainBangladeshBarbadosBelarusBelgiumBelizeBeninBermudaBhutanBoliviaBonaire, Sint Eustatius and SabaBosnia and HerzegovinaBotswanaBouvet IslandBrazilBritish Indian Ocean TerritoryBrunei DarussalamBulgariaBurkina FasoBurundiCabo VerdeCambodiaCameroonCanadaCayman IslandsCentral African RepublicChadChileChinaChristmas IslandCocos IslandsColombiaComorosCongoCongo, Democratic Republic of theCook IslandsCosta[...]

Read More
Global CISO Forum Podcast Episode 8: Gravitate Towards The Challenge

In this Podcast: Host Amber Williams interviews Daniel Mintz, Program Chair, Undergraduate School, Information Systems Management Major, University of Maryland University College about his career and where he sees the future of information security education going. Dan is speaking at the upcoming CISO Summit in Adelphi, MD – for an[…]

Read More
ISSA-NOVA

The Information Systems Security Association Northern Virginia Chapter (ISSA-NOVA), chartered in August 2002, represents one of the fastest-growing technology corridors in the nation. The ISSA-NOVA Chapter is a member-focused organization whose goal is to ensure that its membership keeps abreast of the most recent information pertaining to Information Security topics[…]

Read More