CISO Suggestions for the Equifax Breach [One-Page Facts Sheet Included]

CISO Suggestions for the Equifax Breach By now, most people are somewhat familiar with the facts of the Equifax data security breach. Millions of people had their social security numbers, credit card numbers, addresses, and other personal information stolen. The aftermath has been one of anger, confusion, and a feeling of extreme anxiety – not...

General Data Protection Regulation (GDPR) | Overview, Benefits, Rules, and What it Means for Your Organization

What Is the General Data Protection Regulation (GDPR) and How Does It Affect My Organization? If your organization deals with the processing of personal data, maintaining the security and privacy of that data should be an organization’s top priority. The regulation of data security and privacy are constantly changing, and organizations must be aware of...

CIO Perspective | Top 10 Tips to Improve Your Information Security Program

Perspective from a Seasoned CIO: Top 10 Tips to Improve Your Information Security Program Author: Mike Gentile with Cameron Cosgrove As security practitioners who have built hundreds of security programs for organizations around the world, the team at CISOSHARE is able to provide a unique perspective on what it takes to design an effective information...

10 Signs You Should Invest in an Information Security Program

Why Should You Invest in an Information Security Program? Imagine the following, your business is doing well and things are spinning along at a perfect pace. You read about another information security threat making the news, but you have remained untouched by any major mishaps. You may wonder “Why to invest in a security program?”....

About NIST 800-171 And The Additional Requirements Laid Out By The DFARS

NIST 800-171 is Your Organization Prepared? When an organization works with government agencies such as the Department of Defense (DoD), protecting sensitive information is key. A whole host of rules and regulations govern how third parties must handle such information, and failure to ensure compliance could result in loss of government contracts. Starting in December...

Ransomware | What You Need to Know About Ransomware & Awareness Tips

What You Need to Know About Ransomware Over the past few months, ransomware outbreaks of “WannaCry” and “Petya” have both achieved media headlines. Both outbreaks disrupted or halted business operations of organizations across the globe. Ransomware for past few years has been a growing threat, but now it has matured into a threat that cannot...

Information Security Outsourcing | [White Paper Included]

How Can Information Security Outsourcing Benefit CISOs? It doesn’t matter if an organization specializes in healthcare, retail sales, or widget manufacturing: every organization needs a comprehensive information security program in order to secure its information from theft, loss, breaches, and other threats. Unfortunately, because of the limited number of available dedicated resources with the requisite...

Information Security Architecture | Suite of Preventive & Detective Safeguards

What is Information Security Architecture? An information security architecture program is associated with the management and effectivity of the suite of preventive and detective safeguards as a whole within an environment. The goal of information security architecture program is to ensure that all of the security technologies implemented within the environment work together to meet...

Survey | Do you Have a Security Program and How do you measure it?

How do you measure your security program? We’d love to get your feedback! Take this 3 min survey. The goal is to understand how organizations are measuring their security program today and how they want to measure it moving forward. The CISOSHARE team needs your support to find new ways to serve and educate our...

The Healthcare CISO’s Best Practice to HIPAA Compliance [HIPAA Best Practices Download Included]

HIPAA Compliance Best Practice for Healthcare A CISO’s most valuable tool, apart from their team, is their security program. These procedures govern an organization’s processes in order to protect its information, as well as computer systems, and assets. Potential threats are always looming, and the possibility of a breach by a hacker, theft of information,...