Academic literature on the topic 'Chief Information Security Officer (CISO)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Chief Information Security Officer (CISO).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Chief Information Security Officer (CISO)"
Karanja, Erastus. "The role of the chief information security officer in the management of IT security." Information & Computer Security 25, no. 3 (July 10, 2017): 300–329. http://dx.doi.org/10.1108/ics-02-2016-0013.
Full textSchütz, Thorsten. "CHIEF INFORMATION SECURITY OFFICER: Steuermann durch den IT-Sicherheitsprozess." kma - Klinik Management aktuell 25, no. 03 (March 2020): 54–57. http://dx.doi.org/10.1055/s-0040-1709410.
Full textDa Silva, Joseph, and Rikke Bjerg Jensen. ""Cyber security is a dark art": The CISO as Soothsayer." Proceedings of the ACM on Human-Computer Interaction 6, CSCW2 (November 7, 2022): 1–31. http://dx.doi.org/10.1145/3555090.
Full textJustice, Connie, and Char Sample. "Future Needs of the Cybersecurity Workforce." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 81–91. http://dx.doi.org/10.34190/iccws.17.1.33.
Full textHaislip, Jacob, Jee-Hae Lim, and Robert Pinsker. "The Impact of Executives’ IT Expertise on Reported Data Security Breaches." Information Systems Research 32, no. 2 (June 2021): 318–34. http://dx.doi.org/10.1287/isre.2020.0986.
Full textFord, Adrian, Ameer Al-Nemrat, Sayed Ali Ghorashi, and Julia Davidson. "Impact of CISO Appointment Announcements on the Market Value of Firms." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 375–84. http://dx.doi.org/10.34190/iccws.17.1.49.
Full textElder, Jonathan, Nicole Jacobson, Natalie Remsen, and Kim Wilmath. "Behind Enemy Lines." Journal of Information Technology Education: Discussion Cases 6 (2017): 12. http://dx.doi.org/10.28945/3928.
Full textBanker, Rajiv D., and Cecilia (Qian) Feng. "The Impact of Information Security Breach Incidents on CIO Turnover." Journal of Information Systems 33, no. 3 (August 1, 2019): 309–29. http://dx.doi.org/10.2308/isys-52532.
Full textBouaynaya, Wafa. "Cloud computing in SMEs: towards delegation of the CIO role." Information & Computer Security 28, no. 2 (May 28, 2020): 199–213. http://dx.doi.org/10.1108/ics-01-2017-0001.
Full textAkhtar, Shahzeb, Pratima Amol Sheorey, Sonali Bhattacharya, and Ajith Kumar V. V. "Cyber Security Solutions for Businesses in Financial Services." International Journal of Business Intelligence Research 12, no. 1 (January 2021): 82–97. http://dx.doi.org/10.4018/ijbir.20210101.oa5.
Full textDissertations / Theses on the topic "Chief Information Security Officer (CISO)"
Monzelo, Pedro Miguel Centúrio Sol. "A função do Chief Information Security Officer nas organizações." Master's thesis, Instituto Superior de Economia e Gestão, 2018. http://hdl.handle.net/10400.5/17568.
Full textNum mundo cada vez mais conectado e digital, a informação é crescentemente vista como potenciador do negócio e fonte de vantagem competitiva. Assim, a segurança de informação torna-se crítica ao proteger os ativos de informação, pelo que a estratégia de segurança organizacional tem vindo a alinhar-se com os seus objetivos de negócio. Por outro lado, as recentes alterações legais, tais como a Diretiva Segurança das Redes e da Informação e o Regulamento Geral de Proteção de Dados, vêm impor regras relativamente à privacidade e à segurança da informação, permitindo às organizações um redesenho ou ajuste dos seus processos de forma a garantir que a informação se encontra efetivamente segura. Neste contexto, o Chief Information Security Officer assume um papel de destaque na coordenação da confidencialidade, integridade e disponibilidade da informação na organização. Este trabalho pretende estudar o ambiente geral da segurança de informação nas organizações, analisar o papel do CISO, e compreender onde este deverá estar integrado na estrutura organizacional. Para tal, foram realizadas entrevistas a consultores especialistas e a pessoas com cargos diretivos nas áreas de sistemas de informação e de segurança da informação, que permitiram concluir que ainda é necessário um grande amadurecimento a nível das organizações em Portugal relativamente ao tema, e que tal poderá dever-se à ausência de uma cultura de segurança estabelecida no país. Por outro lado, o papel do CISO tem assumido uma maior relevância, sendo que é uma opinião geral que o mesmo deverá ter uma relação próxima com a administração das organizações.
In an increasingly connected and digital world, information is seen as a business enabler and a source of sustained competitive advantage. Thus, information security is becoming critical so to protect these information assets, which is why the concern with organizations’ security strategy has been aligning with their strategic objectives. On the other hand, recent changes in regulation, as Network and Information Security (NIS) directive and the General Data Protection Regulation (GDPR), come to regulate and create rules when it comes to information security, and allow organizations to redesign or adjust these processes in order to ensure that information is, in fact, safe. In this context, the Chief Information Security Officer (CISO) comes to play an important role in coordinating confidentiality, integrity, and availability of information in the organization. This paper aims to study organizations’ information security environment in general, analyse the CISO’s role inside them, and understand where they should be integrated in the corporate structure. To do so, interviews were conducted on experienced information security consultants and information systems and information security directors, which allowed to conclude that organizations in Portugal still need a great amount of maturing when it comes to information security, and that this may eventually be due to the absence of an established security culture in the country. On the other hand, the CISO’s role has been increasing in relevance, being a general opinion that their relationship with organizations’ boards should be close.
info:eu-repo/semantics/publishedVersion
Psaroulis, Georgia. "Leadership in Organisational Cyber Security." Thesis, 2022. https://hdl.handle.net/2440/136018.
Full textThesis (Ph.D.) -- University of Adelaide, Business School, 2022
Chen, Guan-Ming, and 陳冠銘. "A Study of the Important Characteristics of Successful Chief Information Security Officer of the R.O.C. Air Force." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/83qsc6.
Full text南臺科技大學
資訊管理系
107
Air Force Information Security Officers are specialists in force information requiring outstanding “professional capacity”, “work performance”, and “professional capacity”. Information security preparedness of a unit showcases the comprehensive performance from Information Security Officers and all colleagues. In the military, information education is the key to whether soldiers have sound development of information security literacy and other forms of information. With the information learning experience in the military, an information security officer could hold a position at the Communications Electronics and Information Division, whose good working environment allows the officer to keep advancing professional competency. Multiple resources, such as persons in charge of information facilities and other units, could also be used for the information security officer to devote oneself to information security in the military, further fulfilling the goal of applying what have learned. Guiding colleagues in the unit with correct information security behaviors and keeping modifying and thinking about personal instruction and information security policies to better fit the guide from important information security units make cybersecurity in the military secure from impediment. Following the literature review of teaching quality, a semi-structured interview was drafted and administered to senior information security officers in all military aviation units, with content analysis adopted for data analysis. A self-developed interview outline, titled “Investigation into information security literacy among Air Force Information Security Officers”, served as the major research instrument. The conclusion section, addressing the application of “key factors to enhance information security literacy among Air Force Information Security Officers”, respectively analyzed the effects of leadership, work performance, personality trait, and professional capacity on information security officers’ information security literacy. It is proposed that personnel should be screened out based on related traits, so as to select staff most suitable to the given position to extend affairs related to the unit’s information security, and to enhance the unit’s overall information competency to maintain information security.
Books on the topic "Chief Information Security Officer (CISO)"
Kouns, Barry L. The chief information security officer: Insight, tools and survival skills. Ely, Cambridgeshire, U.K: IT Governance Pub., 2011.
Find full textUnited States. Department of Defense. Chief Information Officer. 2006 Department of Defense Chief Information Officer strategic plan. Washington, D.C: DoD Chief Information Officer, 2006.
Find full textUnited States. Congress. Senate. Committee on Governmental Affairs. Providing for additional responsibilities for the Chief Information Officer of the Department of Homeland Security relating to geospatial information: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 1230 providing for additional responsibilities for the Chief Information Officer of the Department of Homeland Security relating to geospatial information. Washington: U.S. G.P.O., 2004.
Find full textProviding for additional responsibilities for the Chief Information Officer of the Department of Homeland Security relating to geospatial information: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 1230 providing for additional responsibilities for the Chief Information Officer of the Department of Homeland Security relating to geospatial information. Washington: U.S. G.P.O., 2004.
Find full textAffairs, United States Congress Senate Committee on Governmental. Providing for additional responsibilities for the Chief Information Officer of the Department of Homeland Security relating to geospatial information: Report of the Committee on Governmental Affairs, United States Senate, to accompany S. 1230 providing for additional responsibilities for the Chief Information Officer of the Department of Homeland Security relating to geospatial information. Washington: U.S. G.P.O., 2004.
Find full textThe progress of the DHS Chief Intelligence Officer: Hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security, U.S. House of Representatives, One Hundred Ninth Congress, second session, May 24, 2006. Washington: U.S. G.P.O., 2007.
Find full textUnited States. Congress. House. Permanent Select Committee on Intelligence. Subcommittee on Terrorism, Human Intelligence, Analysis, and Counterintelligence, ed. The Department of Homeland Security Second Stage Review: The role of the Chief Intelligence Officer : joint hearing before the Subcommittee on Intelligence, Information Sharing, and Terrorism Risk Assessment of the Committee on Homeland Security joint with the Subcommittee on Terrorism, Human Intelligence, Analysis, and Counterintelligence of the House Permanent Select Committee on Intelligence, House of Representatives, One Hundred Ninth Congress, first session, October 19, 2005. Washington: U.S. G.P.O., 2007.
Find full textAhmed, Mustafa, and David White. Cyber Security : the CISO Quick Start Guide: Enterprise Security Operations Risk Management Architecture for Chief Information Security Officers. Independently Published, 2021.
Find full textBlokdyk, Gerardus. Federal Chief Information Security Officer: Standard Requirements. CreateSpace Independent Publishing Platform, 2018.
Find full textNamuduri, Kamesh. Chief Information Security Officer: Roles and Responsibilities. Taylor & Francis Group, 2019.
Find full textBook chapters on the topic "Chief Information Security Officer (CISO)"
Al-Taie, Moyassar, Michael Lane, and Aileen Cater-Steel. "A Past to Present Journey." In Advances in Business Information Systems and Analytics, 180–206. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6473-9.ch009.
Full textButcher-Powell, Loreen Marie. "Better Securing an Infrastructure for Telework." In Information Security and Ethics, 2044–58. IGI Global, 2008. http://dx.doi.org/10.4018/978-1-59904-937-3.ch137.
Full text"Chief Security Officer or Chief Information Security Officer." In Strategic Information Security, 43–60. Auerbach Publications, 2003. http://dx.doi.org/10.1201/9780203497081-5.
Full text"Chief Security Officer or Chief Information Security Officer." In Strategic Information Security. Auerbach Publications, 2003. http://dx.doi.org/10.1201/9780203497081.ch3.
Full textJohansson, Kevin, Tim Paulsson, Erik Bergström, and Ulf Seigerroth. "Improving Cybersecurity Awareness Among SMEs in the Manufacturing Industry." In Advances in Transdisciplinary Engineering. IOS Press, 2022. http://dx.doi.org/10.3233/atde220140.
Full textStrang, Kenneth David. "Exploring Marketing Theories to Model Business Web Service Procurement Behavior." In Advances in Web Technologies and Engineering, 33–62. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5884-4.ch002.
Full textStrang, Kenneth David. "Exploring Marketing Theories to Model Business Web Service Procurement Behavior." In Web-Based Services, 221–50. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9466-8.ch011.
Full textStrang, Kenneth David. "Exploring Marketing Theories to Model Business Web Service Procurement Behavior." In Marketing and Consumer Behavior, 1911–40. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-7357-1.ch094.
Full textRahul, Kumar, Rohitash Kumar Banyal, and Nikhil Raghav Bhatt. "The Cyber Security Challenges: A Survey of Chief Information Security Officer in Indian Context." In ICT for Competitive Strategies, 749–58. CRC Press, 2020. http://dx.doi.org/10.1201/9781003052098-79.
Full textLatifi, Fariba, and Somayeh Alizadeh. "The Influence of National Factors on Transferring and Adopting Telemedicine Technology." In Virtual and Mobile Healthcare, 933–47. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-5225-9863-3.ch046.
Full textConference papers on the topic "Chief Information Security Officer (CISO)"
van Yperen Hagedoorn, Jeroen M. J., Richard Smit, Patric Versteeg, and Pascal Ravesteijn. "Soft Skills of The Chief Information Security Officer." In Digital Support from Crisis to Progressive Change. University of Maribor Press, 2021. http://dx.doi.org/10.18690/978-961-286-485-9.34.
Full textNamuduri, Kamesh, and Murali Varanasi. "The chief security officer problem." In 2011 45th Annual Conference on Information Sciences and Systems (CISS). IEEE, 2011. http://dx.doi.org/10.1109/ciss.2011.5766177.
Full text