C-Suite View – The Week’s Best News – 2017.08.25

A Review of the Best News of the Week on Cyber C-Suite Views

Securosis is working on an Endpoint Advanced Protection Buyer’s Guide (Securosis Blog, Aug 22 2017)
“There has also been a pseudo-religious battle being waged, in terms of trying to block attacks versus focusing on detection and response once an attack is successful. We aren’t religious folks, and believe the answer is both.”

Gartner’s Hype Cycle Focuses on Integrated Risk Management (Gartner Blog Network, Aug 20 2017)
Risk management programs mitigate the impact of uncertainty on business performance. Gartner recommends an integrated risk management (IRM) approach to build and sustain successful risk management…

For More Than 20 Years, Fortinet CEO Ken Xie Has Shaped The Cyber Security Landscape (Forbes, Aug 20 2017)
Ken Xie’s founded two successful security companies in the 1990s, NetScreen and SIS, each of which dealt with the first generation of network security. In 2000, Xie founded Fortinet. In that time, in the 17 years since, he has taken it public and grown it to $1 billion in revenue. Here’s how….

Sponsored by LogRhythm
SIEM Magic Quadrant
Gartner Positions LogRhythm in SIEM Leaders Quadrant for 5th Consecutive Year. Get the report

Gartner: Cybersecurity Spending Worldwide to Hit $86.4 Billion This Year (Dark Reading, Aug 17 2017)
The global information security market for 2017 will grow by 7% over last year with spending to reach $86.4 billion, according to a new forecast by Gartner. Gartner said spending for security products and services will reach $93 billion in 2018…

What is an enterprise-class cybersecurity vendor? (CSO Online, Aug 17 2017)
ESG surveyed 176 cybersecurity and IT professionals to identify the most important characteristics of an enterprise-class cybersecurity vendor…

President Trump announces move to elevate Cyber Command (Washington Post, Aug 23 2017)
Trump’s move means that Cyber Command will become the 10th unified command in the U.S. military, putting it on par with the main combatant commands, such as Central Command…

Security Needs Vs. Business Strategy – Finding a Common Ground (Cloud Security Alliance Blog, Aug 21 2017)
“While cloud environments are very different from on premise environments, many of the security principles are still valid. As a foundation, I often guide organizations to look at what they are doing today for on-premises security and begin with extending those same principles into the cloud.”

Five things you need to know about executive protection (CSO Online, Aug 15 2017)
Protecting executives today is about much more than physically shielding them from danger…

Survey: 71% of Organizations Have Allocated Cybersecurity Budget (HealthLeaders Media, Aug 25 2017)
A 2017 HIMSS Cybersecurity Survey found that 71% of the organizations included in the survey allocate specific budget toward cybersecurity. Additionally, 80% of IT leaders said their organization employs dedicated cybersecurity staff…

Creating Purpose-Driven Cybersecurity In Your Workplace (Forbes, Aug 25 2017)
To truly combat cybercrime, businesses need to go beyond incentives to create purpose-driven security…

3 Ways Blockchain Is Revolutionizing Cybersecurity (Forbes, Aug 25 2017)
Blockchain tech has an inherent connection to cybersecurity. Blockchain technologies are, after all, the culmination of decades of research and breakthroughs in cryptography and security…

Want to improve cybersecurity? Try phishing your own employees (TechRepublic, Aug 25 2017)
Employees are a company’s weakest security link. Here’s why running internal phishing attacks can strengthen your cybersecurity posture…

Budget and Talent Shortfalls Undermine Public-Sector Cybersecurity, Study Says (FedTech, Aug 25 2017)
A lack of IT security professionals means there are fewer around to investigate threats, a Cisco study finds…

Share on facebook
Share on twitter
Share on linkedin