Article Side

Online Article Directory!

Hello Guest! Login or Register to submit articles!

Research Proves Best Performing Companies Employ a CISO with a High-Performing Security Program

By Eccuni Subscribe to RSS | February 2nd 2012 | Views:
loading
 
  



Research done by SC Magazine proves that organizations that have a Chief Information Security Officer (CISO) have higher profit margins, generate more revenue, and display increased productivity.

January 31, 2012, Albuquerque, NM- EC-Council has released a new white paper that gives comprehensive strategies to CISOs on leading a high-performing information security (IS) program. According to research done by SC Magazine, companies that have an active CISO role and high-performing security program generate more revenue, spend less money, are more productive, and have reduced risks. However, the complexities and challenges of the organization's infrastructure create daily traps that distract IS teams from carrying out tactical and strategic functions.

An effective CISO and well-run information security program can save a company almost 10% of total revenue. SC Magazine's "Want to Reduce IT Risk and Save Money? Hire a CISO" article cites that this saving in gross revenue is accredited to a decreased risk of data loss and theft. Further, the article cites that the most successful companies that employ a CISO to lead an effective IS program are 10 times less likely to experience costly security breaches.

Todd Bell, Executive IT Security Advisor at ConnectTech, LLC., says "Today's threat landscape requires CISOs to develop and implement a high-performing information security (IS) program. One of the biggest challenges is not letting the torrent of corporate issues interfere with the overall effectiveness of the IT security team." Bell, a speaker at EC-Council's CISO Executive Summit in December 2011, was inspired by his panel role in the "Implementing a High-Performing Information Security Program" discussion and developed a how-to-guide for CISOs on leading a high-performing IS program. To view the White Paper, please go to: https://www.eccouncil.org/ciso/resources

"Simply put, CISOs contribute to better business results by ensuring security measures are fully implemented, standardizing and automating procedures, and by taking a strategic role with the organization to make information security a part of a business process." Affirms Jim Hurley, managing director of Symantec's IT Policy Compliance Group.

EC-Council is committed to providing Information Assurance Executive Professionals with the latest Information Security news and trends from the industry's leading experts. Readers of this White Paper are also encouraged to look into EC-Council's Certified Chief Information Security Officer (C|CISO) Certification and EC-Council's CISO Executive Summit Series. To view the full report complete with key takeaways from the CISO Executive Summit or to attend or speak at upcoming CISO Executive Summits, please click here.

Contact:

Marissa Easter – Marketing Communications Specialist (marissa.easter@eccouncil.org)

About EC-Council's Chief Information Security Officer (C|CISO) Certification:

C|CISO is the first certification of its kind to equip Information Assurance leaders with the most effective toolset to defend organizations from cyber attacks. It recognizes an individual's accumulated skills in developing and executing an information security management strategy in alignment with organization goals. Applicants can take advantage of the Grandfather Provision until September 2012. The Grandfather Provision is open to highly-skilled and experienced professionals who can demonstrate and prove proficiency in the 5 C|CISO domains. For more information about C|CISO, please visit: http://www.eccouncil.org/ciso

About EC-Council:

The International Council of E-Commerce Consultants (EC-Council) is a member-based organization that certifies individuals in cyber security and e-commerce. It is the owner and developer of 20 security certifications, including Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI), Certified Security Analyst /Licensed Penetration Tester (ECSA/LPT) and Certified Chief Information Security Officer (C|CISO). EC-Council has trained over 90,000 security professionals and certified more than 40,000 members. EC-Council's certification programs are offered by over 450 training centers across 87 countries. These certifications are recognized worldwide and have received endorsements from various government agencies including the U.S. Department of Defense via DoD 8570.01-M, the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). EC-Council also operates EC-Council University and the global series of Hacker Halted information security conferences.

Eccuni - About Author:

For more information about EC-Council visit www.eccouncil.org follow @ECCouncil on Twitter, LinkedIn or visit EC-Council's Facebook page, Certified Chief Information Security Officer (C|CISO) Certification, Information Security, CISO Executive Summit,
https://www.eccouncil.org/ciso/resources

Share on Facebook Tweet It Stumbleupon this post This post is delicious !

Article Source:
http://www.articleside.com/internet-articles/research-proves-best-performing-companies-employ-a-ciso-with-a-high-performing-security-program.htm

Related Internet Articles Subscribe to RSS

Improve Website security with VeriSign Secure Site certificates
Published by Daren Bresnen on April 23rd 2012 | Internet
In today's world of rapidly evolving technology, many people use electronic media to buy and sell go...
 
How to Use TeenMing
Published by Teen Ming on August 25th 2012 | Internet
With all the people who connect to the internet is almost a requirement for some sort of media conne...
 
How to Use TeenMing
Published by Teen Ming on August 25th 2012 | Internet
With all the people who connect to the internet is almost a requirement for some sort of media conne...
 
How to Use TeenMing
Published by Teen Ming on August 25th 2012 | Internet
With all the people who connect to the internet is almost a requirement for some sort of media conne...
 
How to Use College Student TeenMing
Published by Teen Ming on August 25th 2012 | Internet
On the one hand, an advance that the students have the chance, individual computers and tablet compu...
 
Get Amazing HD Videos with Wedding Videographer
Published by Julia Roger on August 24th 2012 | Internet
Wedding videographers can also make your video very interesting and out of the ordinary. The editing...
 
Get Amazing HD Videos with Wedding Videographer
Published by Julia Roger on August 24th 2012 | Internet
Wedding videographers can also make your video very interesting and out of the ordinary. The editing...