<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Security Leadership and Management</title>
    <description>
      <![CDATA[<style>

.taxonomy-header__description{

width: 675px !important;

max-width: 100% !important;

}

</style>


<p style="font-size: 12px; text-align: right;"><em>Image courtesy of: gorodenkoff (iStock / Getty Images Plus)</em></p>

<p>Explore insights on security leadership and management, featuring best practices, strategies, and expert advice to effectively lead security teams and programs.</p>

]]>
    </description>
    <link>https://www.securitymagazine.com/rss/2227</link>
    <language>en-us</language>
    <item>
      <title>Funding Has Limited Security Readiness</title>
      <description>
        <![CDATA[<p>Limited security funding opens organizations to threat actors.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102269</guid>
      <pubDate>Fri, 15 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102269-funding-has-limited-security-readiness</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-News2-Feat-Slide1-1170x658.webp?t=1777321953" type="image/jpeg" length="125156"/>
    </item>
    <item>
      <title>The Bench You'll Need in Three Years Depends on Decisions You Make Now</title>
      <description>
        <![CDATA[<p>Today’s hiring shortcut is tomorrow’s talent shortage.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102299</guid>
      <pubDate>Thu, 14 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102299-the-bench-youll-need-in-three-years-depends-on-decisions-you-make-now</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Woman-by-whiteboard-by-ThisisEngineering.webp?t=1778690709" type="image/png" length="302550"/>
    </item>
    <item>
      <title>Cybersecurity Is No Longer a Gatekeeper, But the Engine of Delivery Across Digital Economy</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">Cybersecurity is no longer a function that can be delegated and reviewed after the fact.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102297</guid>
      <pubDate>Wed, 13 May 2026 08:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102297-cybersecurity-is-no-longer-a-gatekeeper-but-the-engine-of-delivery-across-digital-economy</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/13/Glowing-fibers-by-Luke-Jones.webp?t=1778673918" type="image/png" length="660440"/>
    </item>
    <item>
      <title>Why Security Leaders Need to Move Beyond the Mental Illness Narrative</title>
      <description>
        <![CDATA[<p>For mental health awareness month, Brian LeBlanc highlights why security is pivotal to preventing a crisis in the workplace.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102267</guid>
      <pubDate>Wed, 13 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102267-why-security-leaders-need-to-move-beyond-the-mental-illness-narrative</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-Edu-Feat-Slide1-1170x658.webp?t=1777320214" type="image/jpeg" length="150576"/>
    </item>
    <item>
      <title>Digital Trust and Identity at ISC West</title>
      <description>
        <![CDATA[<p>ISC West keynote highlights how gaps across physical access points, digital systems and human processes undermine trust and organizational resilience.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102258</guid>
      <pubDate>Mon, 11 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102258-digital-trust-and-identity-at-isc-west</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-Talk-Feat-Slide1-1170x658.webp?t=1778688553" type="image/jpeg" length="137583"/>
    </item>
    <item>
      <title>AI Will Tell Your Breach Story for the Next Two Years — Day One Decides What It Says</title>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">The companies that win the AI-era reputation fight will be the ones whose CISOs and CCOs share a line item, a runbook, and a dashboard.&nbsp;</span>
</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102295</guid>
      <pubDate>Fri, 08 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102295-ai-will-tell-your-breach-story-for-the-next-two-years-day-one-decides-what-it-says</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/07/Megaphone-by-Igor-Omilaev.webp?t=1778183697" type="image/png" length="664838"/>
    </item>
    <item>
      <title>Partners in Protection: How to Utilize a Canine Security Force</title>
      <description>
        <![CDATA[<p>Organizations of all sizes are looking for innovative ways, including canine teams, to advance their security programs.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102256</guid>
      <pubDate>Fri, 08 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102256-partners-in-protection-how-to-utilize-a-canine-security-force</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-F4-Feat-Slide1-1170x658.webp?t=1778688552" type="image/jpeg" length="88680"/>
    </item>
    <item>
      <title>Cybersecurity Professionals Need to Think Like Business Leaders</title>
      <description>
        <![CDATA[<p>When CISOs, CIOs, and other cyber leaders approach the board, they often run into a familiar problem: the C-suite doesn’t speak their language.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/blogs/14/post/102288</guid>
      <pubDate>Wed, 06 May 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/blogs/14-security-blog/post/102288-cybersecurity-professionals-need-to-think-like-business-leaders</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/05/Conference-room-by-Nastuh-Abootalebi.webp?t=1777992516" type="image/png" length="448831"/>
    </item>
    <item>
      <title>5 Skills That Will Serve You in Your Security Career</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>An experienced security consultant shares what she has learned as a corporate security executive and as the CEO of a consulting group.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102254</guid>
      <pubDate>Wed, 06 May 2026 07:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102254-5-skills-that-will-serve-you-in-your-security-career</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-F3-Feat-Slide1-1170x658.webp?t=1778688553" type="image/jpeg" length="104457"/>
    </item>
    <item>
      <title>The Art of Security: It Is Time to Rethink the CISO’s Role</title>
      <description>
        <![CDATA[<p>The CISO’s role, and the cultural and strategic mindset that influences it, must change.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102286</guid>
      <pubDate>Tue, 05 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102286-the-art-of-security-it-is-time-to-rethink-the-cisos-role</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/05/04/Hand-holding-lightbulb-by-lilartsy.webp?t=1777907907" type="image/png" length="297154"/>
    </item>
    <item>
      <title>12 Tips for Building an Effective Security Budget</title>
      <description>
        <![CDATA[<p>Alan Saquella, CPP, shares 12 tips for building a strong security budget.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102247</guid>
      <pubDate>Fri, 01 May 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102247-12-tips-for-building-an-effective-security-budget</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/05-May/SEC-0526-F1-Feat-Slide1-1170x658.webp?t=1778688551" type="image/jpeg" length="145053"/>
    </item>
    <item>
      <title>Building Public/Private Partnerships That Actually Move the Needle</title>
      <description>
        <![CDATA[<p>Public and private sector partnerships strengthen security at every level.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102223</guid>
      <pubDate>Thu, 30 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102223-building-public-private-partnerships-that-actually-move-the-needle</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-F4-Feat-Slide1-1170x658.webp?t=1775663758" type="image/jpeg" length="84465"/>
    </item>
    <item>
      <title>Protecting U.S. Critical Infrastructure as Global Tensions Rise</title>
      <description>
        <![CDATA[<p>Security leader discusses protecting critical infrastructure as geopolitical tensions grow.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102222</guid>
      <pubDate>Wed, 29 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102222-protecting-us-critical-infrastructure-as-global-tensions-rise</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Talk-Feat-Slide1-1170x658.webp?t=1775662528" type="image/jpeg" length="98148"/>
    </item>
    <item>
      <title>What the Medtronic Breach Means for Security Experts</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Security experts are sharing their insights on the broader implications of this breach. </p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102266</guid>
      <pubDate>Mon, 27 Apr 2026 12:30:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102266-what-the-medtronic-breach-means-for-security-experts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/27/Laptop-and-coffee-in-shade-by-Guillermo-Latorre.webp?t=1777306421" type="image/png" length="371256"/>
    </item>
    <item>
      <title>Security Career or Security Blanket? Turning Fearful Staying into Commitment</title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>Building a culture where your best security people choose your organization is key.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102218</guid>
      <pubDate>Mon, 27 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102218-security-career-or-security-blanket-turning-fearful-staying-into-commitment</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Career-Feat-Slide1-1170x658.webp?t=1775661149" type="image/jpeg" length="73202"/>
    </item>
    <item>
      <title>Succeeding an Underwhelming Leader</title>
      <description>
        <![CDATA[<p>Security leaders discuss taking over leadership after an underperforming leader.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102217</guid>
      <pubDate>Fri, 24 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102217-succeeding-an-underwhelming-leader</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Leader-Feat-Slide1-1170x658.webp?t=1775660728" type="image/jpeg" length="35610"/>
    </item>
    <item>
      <title>Security Leaders Discuss the Claude Mythos Breach </title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>What security experts are saying about the Claude Mythos breach.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102253</guid>
      <pubDate>Thu, 23 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102253-security-leaders-discuss-the-claude-mythos-breach</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/AI-chip-by-Igor-Omilaev.webp?t=1776956192" type="image/png" length="845851"/>
    </item>
    <item>
      <title>NIST’s New Prioritization Criteria for CVEs, Examined by Experts</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">NIST recently changed how it handles CVEs.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102255</guid>
      <pubDate>Thu, 23 Apr 2026 11:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102255-nists-new-prioritization-criteria-for-cves-examined-by-experts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/23/Green-padlock-on-keyboard-by-rupixen.webp?t=1776955351" type="image/png" length="306013"/>
    </item>
    <item>
      <title>How Should Effective AI Red Teams Operate?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Dr. Peter Garraghan speaks with <em>Security </em>magazine about AI-specific red teaming.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102249</guid>
      <pubDate>Thu, 23 Apr 2026 02:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102249-how-should-effective-ai-red-teams-operate</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/22/SEC_Web_5Minutes-Garraghan-0426_1170x658.webp?t=1776873919" type="image/jpeg" length="99911"/>
    </item>
    <item>
      <title>Why Bridging Siloes Doesn’t Need to Be Complicated</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Bruce McIndoe provides actionable steps for bridging siloes.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102240</guid>
      <pubDate>Wed, 22 Apr 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102240-why-bridging-siloes-doesnt-need-to-be-complicated</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/21/McIndoe-podcast-news-header.webp?t=1776785504" type="image/png" length="120498"/>
    </item>
    <item>
      <title>Advance Your Cybersecurity Career</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security</em> magazine talks with a CISO about how cyber professionals can advance their careers.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102214</guid>
      <pubDate>Mon, 20 Apr 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102214-advance-your-cybersecurity-career</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-Edu-Feat-Slide1-1170x658.webp?t=1776895797" type="image/jpeg" length="123294"/>
    </item>
    <item>
      <title>Top 3 Cyber Insurance Incident Claims</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">A new report reveals the top three cyber incidents that account for a majority of reported claims.&nbsp;</span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102232</guid>
      <pubDate>Mon, 20 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102232-top-3-cyber-insurance-incident-claims</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/17/Laptop-keyboard-in-gradient-colorful-light-by-Jonas-Vandermeiren.webp?t=1776442444" type="image/png" length="151909"/>
    </item>
    <item>
      <title>How CSOs Can Win Board Support for Gunshot Detection Technology</title>
      <description>
        <![CDATA[<p>How CSOs can win board support for gunshot detection technology.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102211</guid>
      <pubDate>Fri, 17 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102211-how-csos-can-win-board-support-for-gunshot-detection-technology</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-F3-Feat-Slide1-1170x658.webp?t=1776895797" type="image/jpeg" length="69139"/>
    </item>
    <item>
      <title>Beyond the Bodyguard: Why Executive Protection Requires a New Playbook</title>
      <description>
        <![CDATA[<p>A new model is needed for a new era of executive protection.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102210</guid>
      <pubDate>Wed, 15 Apr 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102210-beyond-the-bodyguard-why-executive-protection-requires-a-new-playbook</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/04-April/SEC-0426-F2-Feat-Slide1-1170x658.webp?t=1776895796" type="image/jpeg" length="78157"/>
    </item>
    <item>
      <title>3 Quantum Realities to Confront this World Quantum Day</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>3 quantum realities security leaders need to confront.&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102229</guid>
      <pubDate>Tue, 14 Apr 2026 08:15:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102229-3-quantum-realities-to-confront-this-world-quantum-day</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/04/13/Transparent-cube-and-colorful-squares-by-David-Clode.webp?t=1776099451" type="image/png" length="686636"/>
    </item>
    <item>
      <title>How to Grow Your Cybersecurity Skills, According to Experts</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>How are cybersecurity professionals developing their career for the modern era?&nbsp;</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102181</guid>
      <pubDate>Fri, 27 Mar 2026 05:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102181-how-to-grow-your-cybersecurity-skills-according-to-experts</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/23/Young-man-working-on-laptop-in-coffee-shop-by-Miguel-Dominguez.webp?t=1774285182" type="image/png" length="621832"/>
    </item>
    <item>
      <title>Breaking Down “The Mosaic Effect”</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p><em>Security&nbsp;</em>magazine talks with Luke Norris, C<span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">o-Founder and CEO of Kamiwaza, about <span style=" font-style: normal; font-weight: 400; letter-spacing: normal; orphans: 2; text-align: left; widows: 2; word-spacing: 0px; display: inline !important; float: none;">“the mosaic effect” and how AI is shaping it today.&nbsp;</span></span></p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102186</guid>
      <pubDate>Thu, 26 Mar 2026 04:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102186-breaking-down-the-mosaic-effect</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/18/SEC_Web_5Minutes-Norris-0326_1170x658.webp?t=1773855022" type="image/jpeg" length="84529"/>
    </item>
    <item>
      <title>What Does It Take to Be an Outstanding CSO or CISO?</title>
      <author>algerj@bnpmedia.com (Jordyn Alger)</author>
      <description>
        <![CDATA[<p>Scott McHugh, Program Executive, Institute for Homeland Security at Sam Houston State University, discusses what it takes to be a great CSO or CISO in the modern age.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102171</guid>
      <pubDate>Wed, 25 Mar 2026 12:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102171-what-does-it-take-to-be-an-outstanding-cso-or-ciso</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/2026/03/12/McHugh-podcast-news-header.webp?t=1773332170" type="image/png" length="132615"/>
    </item>
    <item>
      <title>Succeeding A Legendary Leader</title>
      <description>
        <![CDATA[<p>What happens when stepping into the shadow of a seemingly irreplaceable predecessor.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102193</guid>
      <pubDate>Wed, 25 Mar 2026 00:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102193-succeeding-a-legendary-leader</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Leader-Feat-Slide1-1170x658.webp?t=1775680875" type="image/jpeg" length="184258"/>
    </item>
    <item>
      <title>Is Crowdsourcing Your Security Plan a Career Risk? </title>
      <author>jerry@smrgroup.com (Jerry J. Brennan)</author>
      <description>
        <![CDATA[<p>Build meaningful insights from relationships with other security leaders.</p>]]>
      </description>
      <guid>http://www.securitymagazine.com/articles/102176</guid>
      <pubDate>Mon, 23 Mar 2026 09:00:00 -0400</pubDate>
      <link>https://www.securitymagazine.com/articles/102176-is-crowdsourcing-your-security-plan-a-career-risk</link>
      <enclosure url="https://www.securitymagazine.com/ext/resources/Issues/2026/03-March/SEC-0326-Career-Feat-Slide1-1170x658.webp?t=1775680875" type="image/jpeg" length="101737"/>
    </item>
  </channel>
</rss>
