how-toTabletop exercise scenarios: 10 tips, 6 examplesA tabletop exercise is a discussion-based session to test your team on roles and responses during for emergency scenarios. Here are example scenarios and tips to help tune your team for response success.By Josh Fruhlinger and Sarah D. Scalet04 Jul 202416 minsRansomwarePhishingDisaster Recovery feature The BISO: bringing security to business and business to securityBy Deb Radcliff05 Jan 20237 minsC-SuiteBusiness IT AlignmentData and Information Securityfeature How acceptable is your acceptable use policy?By Vawn Himmelsbach14 Dec 20228 minsCSO and CISOAccess ControlBusiness IT Alignment feature8 things to consider amid cybersecurity vendor layoffsBy Michael Hill 01 Dec 202212 minsBusiness OperationsVendors and Providers opinionCISOs: Do you know what's in your company’s products?By Christopher Burgess 05 Aug 20214 minsCSO and CISOBusiness OperationsSecurity Articles View all Upcoming Events28/Nov conference The Official CSO Security Summit UK28 Nov 20249:00 am – 17:30Andaz London Liverpool Street CSO and CISO 28/Nov awards CSO 30 Awards UK28 Nov 202418:00 – 21:30Andaz London Liverpool Street CSO and CISO 28/Nov awards Next CSO Awards UK28 Nov 202418:30-21:30 GMTAndaz London Liverpool Street CSO and CISO View all events Resources whitepaper Best Practices in Cybersecurity and Cyber Resilience In today’s digital world, consumers and employees expect organizations of all types and sizes to operate without interruption. In fact, contractual obligations and service level agreements demand it. The post Best Practices in Cybersecurity and Cyber Resilience appeared first on Whitepaper Repository –. By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeData and Information Security whitepaper Cyber resilience in the ransomware era By Cohesity Inc. 26 Aug 2024Business OperationsCybercrimeSecurity whitepaper Unlock the power of AI and ML for data protection By Cohesity Inc. 26 Aug 2024Artificial IntelligenceBusiness OperationsMachine Learning View all Explore a topic Application Security Business Continuity Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management View all topics All topics Close Application Security Business Continuity Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos feature How to ensure cybersecurity strategies align with the company’s risk tolerance By Rosalyn Page 03 Sep 202410 mins CSO and CISORisk Management news North Korean hackers actively exploited a critical Chromium zero-day By Shweta Sharma 02 Sep 20243 mins Zero-day vulnerability feature Ransomware recovery: 8 steps to successfully restore from backup By Maria Korolov 02 Sep 202417 mins RansomwareMalwareBackup and Recovery podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins RansomwareZero TrustCloud Security video CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO video Cybersecurity Insights for Tech Leaders: Addressing Dynamic Threats and AI Risks with Resilience 10 Jul 202424 mins CSO and CISO