Omer Grossman | CIO Connection
Executive Content
-
CIO POV: Five Essential Themes Shaping the CIO’s Tech Agenda
Technology is rapidly redefining how we live and work. As CIO at CyberArk, I often get asked about the themes and realities shaping today’s tech agenda. Some of them—I’m looking at you, AI—are...
-
CIO POV: Ransomware and Resilience—2024’s Biggest Cyber Stories
Let’s begin 2025 with an understatement about last year: 2024 was an eventful year for cybersecurity. That in itself is no surprise. The specifics, though, looked like this: AI use accelerated...
-
CIO POV: Beware of Deepfakes Infiltrating the Enterprise
Many years ago, the philosopher Phaedrus said, “Things are not always what they seem; the first appearance deceives many; the intelligence of a few perceives what has been carefully hidden.” He...
-
CIO POV: How Modern CIOs Wear (at Least) Seven Different Hats
When the title of chief information officer (CIO) first emerged in the early 1980s, it was very different from what it is today. Technology evolution, emerging threats and new realities have...
-
CIO POV: Impactful AI Programs Start with ‘Why’
Generative AI (GenAI) has the power to transform organizations from the inside out. Yet many organizations are struggling to prove the value of their GenAI investments after the initial push to...
-
CIO POV: CrowdStrike Incident Offers 3 Digital Resilience Lessons
On July 19, 2024, organizations around the world began to experience the “blue screen of death” in what would soon be considered one of the largest IT outages in history. Early rumors of a mass...
-
5 Strategies for Setting the Right Cybersecurity KPIs
Cybersecurity key performance indicators (KPIs) measure the efficacy of an organization’s cybersecurity program. In a rapidly changing threat landscape characterized by new identities,...
-
CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks
Watching the recent Snowflake customer attacks unfold felt a bit like rewatching a horror movie with predictable attack sequences and missed opportunities to run to safety. But this time, the...
-
CIO POV: Building Resilience in a Complex Threat Landscape
As a CIO, I often wish for a world where the threat landscape is less expansive and complicated than it is today. Unfortunately, the reality is quite different. This month, I find myself...
-
Synchronized Swimming: The Relationship Between Privacy and Cybersecurity Teams
Data theft, data protection and the leakage of passwords or secrets are the top two cloud security concerns for 2,400 cybersecurity experts, according to the recently released CyberArk 2024...
-
CIO POV: Navigating the Deepfake Pandemic with Proactive Measures
We’re in the throes of another pandemic, but this time, it’s not transmitted through the air – it spreads with just a click. Welcome to the world of deepfakes. While COVID-19 significantly...
-
CIO POV: The Power of Cybersecurity Collaboration
You’ve undoubtedly heard Michael Jordon’s famous quote, “Talent wins games, but teamwork and intelligence win championships.” Jordan’s words encapsulate the fruition of team spirit and strategic...
-
Election Security: Defending Democracy in Today’s Dynamic Cyber Threat Landscape
With over 50 countries heading to the polls this year, including major economies like the U.S., India and the U.K., 2024, one way or another, will be a defining year with over 4 billion voters...
-
CIO POV: What Makes a Good Neighbor in a Bad Cyber Neighborhood
“It’s discouraging to try to be a good neighbor in a bad neighborhood.” –William Castle This quote from the late American horror film director has recently been running through my head as I think...
-
CIO POV: 3 Considerations as the 2024 Cyber Roller Coaster Gathers Speed
If the first month-plus of 2024 is any indication, this year is likely to be anything but ordinary in the cybersecurity realm. In January alone, a triad of events unfolded, each more riveting than...
-
GenAI’s Role in Upskilling to Close the Cybersecurity Skills Gap
The cybersecurity industry has a major people problem: it doesn’t have enough of them. The global shortage of more than 4 million cybersecurity workers isn’t a new phenomenon, but as digital and...
-
28:07
Fireside chat: Trends Driving an Identity Security Approach
CyberArk’s CIO and SVP of Identity Security offer perspective on trends and how transformational organizations keep a step ahead of attackers.
-
Engaging Insiders to Combat Insider Threats
Every IT and security leader loses sleep over insider threats. They’re notoriously difficult to detect, costly to mitigate and can lead to widespread loss and reputational damage. Despite efforts...
-
Protect Passwords, Don’t Just Manage Them: A Game Plan for CIOs and CISOs
Learn how to protect employees’ passwords to applications containing sensitive resources.
-
Loading More...