Thief! Intruder! Sometimes, perimeter security puts you in contact with a variety of visitors, not all of them welcome, but how does one differentiate between visitors without making a bad first impression or creating a vulnerable situation?
In the wake of many cybersecurity breaches, SEC's aggressive agenda demonstrates that cybersecurity management is vital to U.S. public companies and capital markets.
As I travel the U.S. and the world, I am frequently asked what the proper reporting structure is for the Chief Information Security Officer (CISO). While it sounds cliché, the real answer is “it depends.”