Tag: management
-
How CISOs Follow The Money
Kayne posits, “If you want to see what your new product features are going to be in the next 12 to 18 months, see where the VCs are spending their dollars. If we’ve seen something consistently in the past, in the past 10 years we’ve seen $30 billion of investment inside of cyber security.”McGladrey is…
-
Q&A: Security Thought Leaders Discuss Certs, SMEs & Hiring Process
One way to combat that involves grassroots efforts to boost the ranks. But do security teams search for qualified, seasoned experts, and do they look for specialization or the proverbial “generalist” who can cover many corners of the cyber space? It is an ongoing debate in the industry, and today, we’ve brought together two security…
-
The IT exec’s reading list
For creative direction on hiring, Kayne McGladrey, co-founder of Include Cybersecurity, turned to “Who,” by Geoff Smart and Randy Street. “This is a book I consistently recommend to all managers and directors who are responsible for hiring personnel, in that it defines a consistent and repeatable technique for identifying and hiring high-performing candidates,” McGladrey says. “When…
-
How An Identity and Access Management Program Saved a Retailer $100k+ In Fraud Annually
Gartner estimates that 63% of all IAM products will be thrown out in the next two years as the ‘requirements have changed’ since the date of original purchase. The challenge for new and existing IAM programs is to establish and maintain a strong justification for the program’s continued existence. One retail client recognized this potential…
-
Cyber Threat Prevention: How to Keep Your Services Organization From Being Hacked
Consulting firms can suffer irreparable damage to their reputation if they lose client data due to a cybersecurity incident. This article examines the current threat landscape and provides strategic guidance to prevent professional services firms from becoming the next breach statistic.