
Cybersecurity Threats: What Keeps CISOs Up at 10 p.m.?
Description
Cybersecurity Threats: What Keeps CISOs Up at 10 p.m.?
This IDC Perspective discusses what financial institution chief information security officers (CISOs) do to mitigate network threats from both external and internal entities. These women and men are sometimes unsung heroes helping defend the institution from criminal threats 24 x 7 x 365 using the help of sophisticated and robust software that are always on the lookout for the next threat against the institution's network. The timing of 10:00 p.m. is an arbitrary time that is at the end of a day when CISOs have finished their responsibilities and let their mind reflect and wander as to what's next — a time to think more strategically rather than operationally about the asymmetric warfare they face each day.According to Kevin Dolan, research director, Worldwide Compliance, Fraud and Risk Analytics Strategies at IDC, "CISOs work logically and diligently to help keep their institutions safe and also hone their craft to be on guard for the next new threat."
Please Note: Extended description available upon request.
This IDC Perspective discusses what financial institution chief information security officers (CISOs) do to mitigate network threats from both external and internal entities. These women and men are sometimes unsung heroes helping defend the institution from criminal threats 24 x 7 x 365 using the help of sophisticated and robust software that are always on the lookout for the next threat against the institution's network. The timing of 10:00 p.m. is an arbitrary time that is at the end of a day when CISOs have finished their responsibilities and let their mind reflect and wander as to what's next — a time to think more strategically rather than operationally about the asymmetric warfare they face each day.According to Kevin Dolan, research director, Worldwide Compliance, Fraud and Risk Analytics Strategies at IDC, "CISOs work logically and diligently to help keep their institutions safe and also hone their craft to be on guard for the next new threat."
Please Note: Extended description available upon request.
Table of Contents
9 Pages
- Executive Snapshot
- Situation Overview
- How Big of a Problem Are Cybersecurity Attacks?
- Digital Transformation Projects and Cybersecurity
- Cybersecurity Threats Facing FIs
- CISOs' Team-Based Approach Against Cybersecurity Threats
- What Kind of Damage Can Occur if Attacked?
- CISOs Keep FIs Safe
- Unintended Human Errors
- CISO Team Collaboration
- Advice for the Technology Buyer
- Learn More
- Related Research
- Synopsis
Pricing
Currency Rates
Questions or Comments?
Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.