Omer Grossman | CIO Connection

Executive Content

  • CIO POV: CrowdStrike Incident Offers 3 Digital Resilience Lessons

    CIO POV: CrowdStrike Incident Offers 3 Digital Resilience Lessons

    On July 19, 2024, organizations around the world began to experience the “blue screen of death” in what would soon be considered one of the largest IT outages in history. Early rumors of a mass...

    Read Blog
  • CIO POV: Building Resilience in a Complex Threat Landscape

    CIO POV: Building Resilience in a Complex Threat Landscape

    As a CIO, I often wish for a world where the threat landscape is less expansive and complicated than it is today. Unfortunately, the reality is quite different. This month, I find myself...

    Read Blog
  • Synchronized Swimming: The Relationship Between Privacy and Cybersecurity Teams

    Synchronized Swimming: The Relationship Between Privacy and Cybersecurity Teams

    Data theft, data protection and the leakage of passwords or secrets are the top two cloud security concerns for 2,400 cybersecurity experts, according to the recently released CyberArk 2024...

    Read Blog
  • CIO POV: Navigating the Deepfake Pandemic with Proactive Measures

    CIO POV: Navigating the Deepfake Pandemic with Proactive Measures

    We’re in the throes of another pandemic, but this time, it’s not transmitted through the air – it spreads with just a click. Welcome to the world of deepfakes. While COVID-19 significantly...

    Read Blog
  • CIO POV: The Power of Cybersecurity Collaboration

    CIO POV: The Power of Cybersecurity Collaboration

    You’ve undoubtedly heard Michael Jordon’s famous quote, “Talent wins games, but teamwork and intelligence win championships.” Jordan’s words encapsulate the fruition of team spirit and strategic...

    Read Blog
  • CIO POV: What Makes a Good Neighbor in a Bad Cyber Neighborhood

    CIO POV: What Makes a Good Neighbor in a Bad Cyber Neighborhood

    “It’s discouraging to try to be a good neighbor in a bad neighborhood.” –William Castle This quote from the late American horror film director has recently been running through my head as I think...

    Read Blog
  • CIO POV: 3 Considerations as the 2024 Cyber Roller Coaster Gathers Speed

    CIO POV: 3 Considerations as the 2024 Cyber Roller Coaster Gathers Speed

    If the first month-plus of 2024 is any indication, this year is likely to be anything but ordinary in the cybersecurity realm. In January alone, a triad of events unfolded, each more riveting than...

    Read Blog
  • GenAI’s Role in Upskilling to Close the Cybersecurity Skills Gap

    GenAI’s Role in Upskilling to Close the Cybersecurity Skills Gap

    The cybersecurity industry has a major people problem: it doesn’t have enough of them. The global shortage of more than 4 million cybersecurity workers isn’t a new phenomenon, but as digital and...

    Read Blog
  • Fireside chat: Trends Driving an Identity Security Approach28:07

    Fireside chat: Trends Driving an Identity Security Approach

    CyberArk’s CIO and SVP of Identity Security offer perspective on trends and how transformational organizations keep a step ahead of attackers.

    Watch Video
  • Engaging Insiders to Combat Insider Threats

    Engaging Insiders to Combat Insider Threats

    Every IT and security leader loses sleep over insider threats. They’re notoriously difficult to detect, costly to mitigate and can lead to widespread loss and reputational damage. Despite efforts...

    Read Blog
  • Protect Passwords, Don’t Just Manage Them: A Game Plan for CIOs and CISOs

    Protect Passwords, Don’t Just Manage Them: A Game Plan for CIOs and CISOs

    Learn how to protect employees’ passwords to applications containing sensitive resources.

    Read More
  • CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks

    CIO POV: Rethinking Data Security Post-Snowflake Customer Attacks

    Watching the recent Snowflake customer attacks unfold felt a bit like rewatching a horror movie with predictable attack sequences and missed opportunities to run to safety. But this time, the...

    Read Blog
  • Election Security: Defending Democracy in Today’s Dynamic Cyber Threat Landscape

    Election Security: Defending Democracy in Today’s Dynamic Cyber Threat Landscape

    With over 50 countries heading to the polls this year, including major economies like the U.S., India and the U.K., 2024, one way or another, will be a defining year with over 4 billion voters...

    Read Blog
  • 5 Strategies for Setting the Right Cybersecurity KPIs

    5 Strategies for Setting the Right Cybersecurity KPIs

    Cybersecurity key performance indicators (KPIs) measure the efficacy of an organization’s cybersecurity program. In a rapidly changing threat landscape characterized by new identities,...

    Read Blog
  • loading
    Loading More...