Tack on Another "C" In Security Function

Marshall, Jeffrey; Heffes, Ellen M.
December 2003
Financial Executive;Dec2003, Vol. 19 Issue 9, p11
Academic Journal
In this article the author describes the responsibilities of a chief information security officer (CISO). The author notes that the need for increased computer security has prompted the creation of the position and he discusses this need with James Wade, CISO of KeyCorp., about what the job requires. Wade notes that the job brings the security viewpoint into the C-suite, which allows a company's security to be included in how they do business. He adds that this is becoming increasingly important due to the rise in mergers in areas such as financial services which require high security.


Related Articles

  • KEEP IT PRIVATE. Robinson, Ten // SC Magazine: For IT Security Professionals (15476693);Dec2015/Jan2016, Vol. 26 Issue 12, p20 

    The article discusses aspects of the proliferation and interconnectedness of applications (apps) and portable devices in stealing information due to incomplete data protection law. It highlights the cyberthreat of technological advancement that challenge the privacy of personal data. It also...

  • Harnessing IT Trends in 2014. Prabhas, Kumar // Dataquest;1/15/2014, Vol. 32 Issue 1, p30 

    The article discusses the initiatives on how to manage the Information Technology (IT) trends for future development, innovation and competitive advantage security in 2014. It states the need of organizations to look for new tools and techniques to hide sensitive information and access to the...

  • Shrinking the Elephant in the Room. Benjes, Dietrich // Database & Network Journal;Dec2015, Vol. 45 Issue 6, p18 

    The article discusses employee misjudgment as a common inside threat to information security. It also offers tips on how to control the data to manage incidence of employee misjudgment which include eliminating global access groups, the enforcement of a need to know data security model, and...

  • Cybersecurity Economic Issues: Clearing the Path to Good Practice. Pfleeger, Shari Lawrence; Rue, Rachel // IEEE Software;Jan/Feb2008, Vol. 25 Issue 1, p35 

    The article focuses on how organizations and security analysts manage cyber attacks and describe its consequences. It offers information on how to gather the appropriate data and how to make good trade-offs between cost and level protections. The authors present a framework for comparing...

  • THINKING INSIDE AND OUTSIDE THE GLASS BOX. Christiansen, Scott E. // Baseline;Sep2008, Issue 88, p12 

    The article offers insights on the importance of keeping an organized and structured security system for industries having huge computer databases. It presents an overview on the concept of computer security which functions like a glass box filled with liquid wherein, several contents remain...

  • Literature Review of Mobile Applications Testing on Cloud from Information Security Perspective. Bahl, Shilpa; Chaturvedi, M. M. // International Journal of Computer Applications;Oct2013, Vol. 79, p15 

    The adoption of mobile application is increasing at enormous rate due to their improved functionality and features. Increased storage and computing power has augmented its utility. However, these mobile applications are still intrinsically limited by a relative lack of bandwidth, computing...

  • Data Security In A Real-Time World Requires 'Defense In Depth' Strategy. Huntley, Vance // National Underwriter / P&C;7/19/2010, Vol. 114 Issue 25, p18 

    The article offers the author's insights on the three main concepts of information security such as confidentiality, integrity, and availability. He says that confidentiality refers to the assurance and authorization given to individuals who have an access on data. He cites the integrity is the...

  • Study on the Host Security Protection in the Internet Environment. LiJuan Zhuang // Applied Mechanics & Materials;2014, Issue 635-637, p1628 

    In the context of the rapid development of Internet technology, information security is particularly important, especially at present there is growing incidence of attack targeting at the host and a variety of attacking means, which does a lot of harm. To do preventive work well is to figure out...

  • Data Breaches: Key Security Strategies to Embrace. Naik, Anand // PC Quest;Feb2013, p20 

    The article discusses the key security strategies against data breaches in the complex information technology environments and challenging economy. It cites the Symantec Cost of Data Breach Study which found that Indian companies that take a more strategic approach to information security have...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics