{"id":1585445,"date":"2017-08-23T13:52:07","date_gmt":"2017-08-23T19:52:07","guid":{"rendered":"http:\/\/secblvd.wpengine.com\/?page_id=1585445"},"modified":"2021-03-12T14:41:55","modified_gmt":"2021-03-12T19:41:55","slug":"ciso-suite","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/ciso-suite\/","title":{"rendered":"CISO Suite"},"content":{"rendered":"<div id=\"pl-1585445\"  class=\"panel-layout\" ><div id=\"pg-1585445-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1585445-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1585445-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1585445-0-0-0\" >\t\t\t<div class=\"textwidget\"><h1>CISO Suite<\/h1>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1585445-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"871ea0f2yr\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037018\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisos-look-to-establish-additional-leadership-roles\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/05\/Leadership-Security-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"CISOs, leadership, security third-party supply chainCISO role\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisos-look-to-establish-additional-leadership-roles\/\" class=\"_self cvplbd\" target=\"_self\" >CISOs Look to Establish Additional Leadership Roles<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/nathan-eddy\/\" rel=\"author\">Nathan Eddy<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T10:49:16-05:00\">2 weeks ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2027992\"><a href=\"https:\/\/securityboulevard.com\/2024\/08\/survey-senior-executives-being-held-more-accountable-for-cybersecurity\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/01\/How-Who-Cyberattacks-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"cybersecurity, risks, industry, Cisco Talos hackers legitimate tools used in cyberattacks\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/08\/survey-senior-executives-being-held-more-accountable-for-cybersecurity\/\" class=\"_self cvplbd\" target=\"_self\" >Survey: Senior Executives Being Held More Accountable for Cybersecurity<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/mike-vizard\/\" rel=\"author\">Michael Vizard<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-08-16T12:53:04-04:00\">4 months ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2025085\"><a href=\"https:\/\/securityboulevard.com\/2024\/07\/cisa-alert-calls-out-operating-system-vulnerabilities\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/04\/cisa-warning-sisense-richixbw.png\" class=\"pt-cv-thumbnail img-none\" alt=\"CISA, cyber threats, Seal of the Cybersecurity &amp; Infrastructure Security Agency\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/04\/cisa-warning-sisense-richixbw.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/04\/cisa-warning-sisense-richixbw-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/04\/cisa-warning-sisense-richixbw-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/07\/cisa-alert-calls-out-operating-system-vulnerabilities\/\" class=\"_self cvplbd\" target=\"_self\" >CISA Alert Calls Out Operating System Vulnerabilities<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/mike-vizard\/\" rel=\"author\">Michael Vizard<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-07-22T09:45:05-04:00\">4 months ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#871ea0f2yr\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#871ea0f2yr\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-fd847d16s5\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1585445-0-0-2\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"2\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-63f1e1bp89\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037559\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/understanding-the-nydfs-cybersecurity-regulation\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Understanding the NYDFS Cybersecurity Regulation\" title=\"\" data-cvpsrc=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Funderstanding-nydfs-cybersecurity-regulation&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/understanding-the-nydfs-cybersecurity-regulation\/\" class=\"_self cvplbd\" target=\"_self\" >Understanding the NYDFS Cybersecurity Regulation<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/legit-security\/\" rel=\"author\">Legit Security<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:57:44-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/best-practices\/' title='Best Practices' class='pt-cv-tax-best-practices'>Best Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/compliance\/' title='Compliance' class='pt-cv-tax-compliance'>Compliance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/explainers\/' title='Explainers' class='pt-cv-tax-explainers'>Explainers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/threats\/' title='threats' class='pt-cv-tax-threats'>threats<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Whether you're a small financial service provider or a major institution, if you\u2019re doing business in the state of New York, you need to meet New York Department of Financial Services (NYDFS) ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037561\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"CMMC Compliance Requirements: A Complete Guide\" title=\"\" data-cvpsrc=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fcmmc-compliance-requirements&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cmmc-compliance-requirements-a-complete-guide\/\" class=\"_self cvplbd\" target=\"_self\" >CMMC Compliance Requirements: A Complete Guide<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/legit-security\/\" rel=\"author\">Legit Security<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:56:55-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/best-practices\/' title='Best Practices' class='pt-cv-tax-best-practices'>Best Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/compliance\/' title='Compliance' class='pt-cv-tax-compliance'>Compliance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/explainers\/' title='Explainers' class='pt-cv-tax-explainers'>Explainers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/threats\/' title='threats' class='pt-cv-tax-threats'>threats<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Department of Defense (DoD) data is some of the most sensitive out there. That\u2019s why the DoD designed the Cybersecurity Maturity Model Certification (CMMC) framework. It helps software providers implement cybersecurity measures ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037565\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/how-to-reduce-risk-from-exposed-secrets\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"How to Reduce Risk From Exposed Secrets\" title=\"\" data-cvpsrc=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Freduce-risk-exposed-secrets&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/how-to-reduce-risk-from-exposed-secrets\/\" class=\"_self cvplbd\" target=\"_self\" >How to Reduce Risk From Exposed Secrets<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/amanda-alvarez\/\" rel=\"author\">Amanda Alvarez<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:30:49-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/appsec\/' title='AppSec' class='pt-cv-tax-appsec'>AppSec<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/best-practices\/' title='Best Practices' class='pt-cv-tax-best-practices'>Best Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/devops\/' title='DEVOPS' class='pt-cv-tax-devops'>DEVOPS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/explainers\/' title='Explainers' class='pt-cv-tax-explainers'>Explainers<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Understand how secrets end up exposed, and how to prevent this risk.\u00a0 ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037308\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/7-best-ai-cybersecurity-tools-for-your-company\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"7 Best AI Cybersecurity Tools for Your Company\" title=\"\" data-cvpsrc=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fbest-ai-cybersecurity-tools&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/7-best-ai-cybersecurity-tools-for-your-company\/\" class=\"_self cvplbd\" target=\"_self\" >7 Best AI Cybersecurity Tools for Your Company<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/legit-security\/\" rel=\"author\">Legit Security<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T15:34:18-05:00\">November 21, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/appsec\/' title='AppSec' class='pt-cv-tax-appsec'>AppSec<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/best-practices\/' title='Best Practices' class='pt-cv-tax-best-practices'>Best Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/explainers\/' title='Explainers' class='pt-cv-tax-explainers'>Explainers<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/threats\/' title='threats' class='pt-cv-tax-threats'>threats<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">With advanced AI cybersecurity tools, you bring powerful capabilities to your security strategy. AI enhances threat detection, automates key security tasks, and strengthens your overall security posture, completing tasks with speed and ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037018\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisos-look-to-establish-additional-leadership-roles\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"CISOs, leadership, security third-party supply chainCISO role\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/05\/Leadership-Security-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisos-look-to-establish-additional-leadership-roles\/\" class=\"_self cvplbd\" target=\"_self\" >CISOs Look to Establish Additional Leadership Roles<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/nathan-eddy\/\" rel=\"author\">Nathan Eddy<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T10:49:16-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/compensation\/' title='compensation' class='pt-cv-tax-compensation'>compensation<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ians\/' title='ians' class='pt-cv-tax-ians'>ians<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/it-security\/' title='IT Security' class='pt-cv-tax-it-security'>IT Security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/recruiting\/' title='recruiting' class='pt-cv-tax-recruiting'>recruiting<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">According to an IANS survey of more than 800 CISOs, roles such as business information security officers (BISOs), chiefs of staff and heads for privacy, program management and data protection are among ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037042\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/legit-secrets-detection-prevention-free-14-day-trial-now-available\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Legit Secrets Detection &amp; Prevention: Free 14-Day Trial Now Available!\" title=\"\" data-cvpsrc=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Flegit-secrets-detection-prevention-free-trial&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/legit-secrets-detection-prevention-free-14-day-trial-now-available\/\" class=\"_self cvplbd\" target=\"_self\" >Legit Secrets Detection &amp; Prevention: Free 14-Day Trial Now Available!<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/dave-howell\/\" rel=\"author\">Dave Howell<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-19T11:23:55-05:00\">November 19, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/appsec\/' title='AppSec' class='pt-cv-tax-appsec'>AppSec<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/best-practices\/' title='Best Practices' class='pt-cv-tax-best-practices'>Best Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/devops\/' title='DEVOPS' class='pt-cv-tax-devops'>DEVOPS<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Get a free trial of the Legit secrets scanner to understand the capabilities of modern secrets scanning.\u00a0 ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036909\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/unlocking-the-power-and-potential-of-genai-in-software-development\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Unlocking the Power and Potential of GenAI in Software Development\" title=\"\" data-cvpsrc=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Funlocking-the-power-and-potential-of-genai-in-software-development&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/unlocking-the-power-and-potential-of-genai-in-software-development\/\" class=\"_self cvplbd\" target=\"_self\" >Unlocking the Power and Potential of GenAI in Software Development<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/suzanne-ciccone\/\" rel=\"author\">Suzanne Ciccone<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-19T05:47:03-05:00\">November 19, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/appsec\/' title='AppSec' class='pt-cv-tax-appsec'>AppSec<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/best-practices\/' title='Best Practices' class='pt-cv-tax-best-practices'>Best Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/devops\/' title='DEVOPS' class='pt-cv-tax-devops'>DEVOPS<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">As GenAI becomes an indispensable tool in software development, organizations are embracing its ability to drive innovation and streamline operations. But this rapid adoption brings with it significant challenges in security, governance, ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2036111\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/creating-an-effective-user-access-review-program-in-12-simple-steps\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Creating an Effective User Access Review Program in 12 Simple Steps\" title=\"\" data-cvpsrc=\"https:\/\/hyperproof.io\/wp-content\/uploads\/2024\/11\/Hyperproof_Creating-an-Effective-User-Access-Review-Program-in-12-Simple-Steps_blog_header-1200x350-1.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/creating-an-effective-user-access-review-program-in-12-simple-steps\/\" class=\"_self cvplbd\" target=\"_self\" >Creating an Effective User Access Review Program in 12 Simple Steps<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/erin-nelson\/\" rel=\"author\">Erin Nelson<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-12T10:00:00-05:00\">November 12, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/blog-posts\/' title='Blog Posts' class='pt-cv-tax-blog-posts'>Blog Posts<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/risk-management\/' title='risk management' class='pt-cv-tax-risk-management'>risk management<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">User access reviews are periodic evaluations of access rights to ensure they align with users\u2019 roles, reducing security risks and helping maintain regulatory compliance. The main goal of user access reviews is ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Hyperproof&feed_id=675&blog_url=https:\/\/hyperproof.io\/\">Hyperproof<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037085\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/beyond-iga-how-pathlock-automates-risk-mitigation-with-continuous-controls-monitoring\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/beyond-iga-how-pathlock-automates-risk-mitigation-with-continuous-controls-monitoring\/\" class=\"_self cvplbd\" target=\"_self\" >Beyond IGA: How Pathlock Automates Risk Mitigation with Continuous Controls Monitoring<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/keri-bowman\/\" rel=\"author\">Keri Bowman<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-12T08:01:56-05:00\">November 12, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/ccm\/' title='CCM' class='pt-cv-tax-ccm'>CCM<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/continuous-controls-monitoring\/' title='continuous controls monitoring' class='pt-cv-tax-continuous-controls-monitoring'>continuous controls monitoring<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/continuous-monitoring\/' title='continuous monitoring' class='pt-cv-tax-continuous-monitoring'>continuous monitoring<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/iga\/' title='IGA' class='pt-cv-tax-iga'>IGA<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/risk-management\/' title='risk management' class='pt-cv-tax-risk-management'>risk management<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/risk-mitigation\/' title='risk mitigation' class='pt-cv-tax-risk-mitigation'>risk mitigation<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">There is no escaping risk in today\u2019s multi-application landscape. The goal for most organizations is to mitigate those risks and bring them down to an acceptable level. While traditional Identity Governance and ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Pathlock&feed_id=1009&blog_url=https:\/\/pathlock.com\/\">Pathlock<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2035893\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-ciso-evolution-from-tactical-defender-to-strategic-business-partner\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"CISO, security,\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/people-1979261_1280-1-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/the-ciso-evolution-from-tactical-defender-to-strategic-business-partner\/\" class=\"_self cvplbd\" target=\"_self\" >The CISO Evolution: From Tactical Defender to Strategic Business Partner<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/mike-riemer\/\" rel=\"author\">Mike Riemer<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-08T04:00:49-05:00\">November 8, 2024<\/time><\/span><\/div>\n<div class=\"pt-cv-content\">The chief information security officer (CISO) role has changed dramatically from just a few short years ago. Once confined to technical security, CISOs have emerged as key strategic partners in the C-suite ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585445\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"50\" data-nextpages=\"2\" data-sid=\"63f1e1bp89\" data-unid=\"362f2059944159c40fbf17be13e3a217\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,R0lGODlhDwAPALMPAMrKygwMDJOTkz09PZWVla+vr3p6euTk5M7OzuXl5TMzMwAAAJmZmWZmZszMzP\/\/\/yH\/C05FVFNDQVBFMi4wAwEAAAAh+QQFCgAPACwAAAAADwAPAAAEQvDJaZaZOIcV8iQK8VRX4iTYoAwZ4iCYoAjZ4RxejhVNoT+mRGP4cyF4Pp0N98sBGIBMEMOotl6YZ3S61Bmbkm4mAgAh+QQFCgAPACwAAAAADQANAAAENPDJSRSZeA418itN8QiK8BiLITVsFiyBBIoYqnoewAD4xPw9iY4XLGYSjkQR4UAUD45DLwIAIfkEBQoADwAsAAAAAA8ACQAABC\/wyVlamTi3nSdgwFNdhEJgTJoNyoB9ISYoQmdjiZPcj7EYCAeCF1gEDo4Dz2eIAAAh+QQFCgAPACwCAAAADQANAAAEM\/DJBxiYeLKdX3IJZT1FU0iIg2RNKx3OkZVnZ98ToRD4MyiDnkAh6BkNC0MvsAj0kMpHBAAh+QQFCgAPACwGAAAACQAPAAAEMDC59KpFDll73HkAA2wVY5KgiK5b0RRoI6MuzG6EQqCDMlSGheEhUAgqgUUAFRySIgAh+QQFCgAPACwCAAIADQANAAAEM\/DJKZNLND\/kkKaHc3xk+QAMYDKsiaqmZCxGVjSFFCxB1vwy2oOgIDxuucxAMTAJFAJNBAAh+QQFCgAPACwAAAYADwAJAAAEMNAs86q1yaWwwv2Ig0jUZx3OYa4XoRAfwADXoAwfo1+CIjyFRuEho60aSNYlOPxEAAAh+QQFCgAPACwAAAIADQANAAAENPA9s4y8+IUVcqaWJ4qEQozSoAzoIyhCK2NFU2SJk0hNnyEOhKR2AzAAj4Pj4GE4W0bkJQIAOw==\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-9fc36e6nqk\">#pt-cv-view-63f1e1bp89 .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-title a, #pt-cv-view-63f1e1bp89  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89  .pt-cv-title a:hover, #pt-cv-view-63f1e1bp89  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-content , #pt-cv-view-63f1e1bp89  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='63f1e1bp89'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='63f1e1bp89'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>CISO Suite<\/p>\n","protected":false},"author":6042,"featured_media":1354607,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1585445","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CISO Suite - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Latest updates on managing security risk by establishing and maintaining processes to ensure information assets and technologies are adequately protected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/ciso-suite\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CISO Suite\" \/>\n<meta property=\"og:description\" content=\"CISO Suite\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/ciso-suite\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-12T19:41:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto22836362.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"638\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/ciso-suite\/\",\"url\":\"https:\/\/securityboulevard.com\/ciso-suite\/\",\"name\":\"CISO Suite - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/ciso-suite\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/ciso-suite\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto22836362.jpg\",\"datePublished\":\"2017-08-23T19:52:07+00:00\",\"dateModified\":\"2021-03-12T19:41:55+00:00\",\"description\":\"Latest updates on managing security risk by establishing and maintaining processes to ensure information assets and technologies are adequately protected.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/ciso-suite\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/ciso-suite\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/ciso-suite\/#primaryimage\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto22836362.jpg\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto22836362.jpg\",\"width\":800,\"height\":638},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/ciso-suite\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"CISO Suite\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CISO Suite - Security Boulevard","description":"Latest updates on managing security risk by establishing and maintaining processes to ensure information assets and technologies are adequately protected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/ciso-suite\/","og_locale":"en_US","og_type":"article","og_title":"CISO Suite","og_description":"CISO Suite","og_url":"https:\/\/securityboulevard.com\/ciso-suite\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2021-03-12T19:41:55+00:00","og_image":[{"width":800,"height":638,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto22836362.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/ciso-suite\/","url":"https:\/\/securityboulevard.com\/ciso-suite\/","name":"CISO Suite - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/ciso-suite\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/ciso-suite\/#primaryimage"},"thumbnailUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto22836362.jpg","datePublished":"2017-08-23T19:52:07+00:00","dateModified":"2021-03-12T19:41:55+00:00","description":"Latest updates on managing security risk by establishing and maintaining processes to ensure information assets and technologies are adequately protected.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/ciso-suite\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/ciso-suite\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/ciso-suite\/#primaryimage","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto22836362.jpg","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto22836362.jpg","width":800,"height":638},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/ciso-suite\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"CISO Suite"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-6ErH","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585445","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1585445"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1585445\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media\/1354607"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1585445"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}