{"id":79084,"date":"2024-06-15T18:31:21","date_gmt":"2024-06-15T10:31:21","guid":{"rendered":"https:\/\/version-2.com\/?p=79084"},"modified":"2024-06-12T18:05:01","modified_gmt":"2024-06-12T10:05:01","slug":"whats-keeping-cisos-up-at-night","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/06\/whats-keeping-cisos-up-at-night\/","title":{"rendered":"What\u2019s keeping CISOs up at night?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"79084\" class=\"elementor elementor-79084\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/images.prismic.io\/keep-it\/ZmlUPpm069VX1qVT_ciso-strategies-blog-93-square.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\" width=\"800\" height=\"800\" \/><\/p><div class=\"content\"><div class=\"section\"><h2>Introduction\u00a0<\/h2><p>Cybersecurity is no longer a siloed concern relegated to IT departments; it\u2019s a fundamental component of business strategy. Chief information security officers (CISOs) face mounting pressures to not only protect their organizations but also to integrate cybersecurity into the broader business framework.<\/p><p>This is the focus of our recent webinar, &#8220;The CISO balancing act: How to tackle rising cybersecurity pressures in 2024,&#8221; where industry experts share insights and strategies. Read further for a summary highlighting the key takeaways.<\/p><\/div><p><a class=\"arrow-btn cobaltblue\" href=\"https:\/\/www.brighttalk.com\/webcast\/20302\/613476?utm_source=brighttalk-portal&amp;utm_medium=web&amp;utm_content=Keepit&amp;utm_term=search-result-2&amp;utm_campaign=webcasts-search-results-feed\" target=\"_blank\" rel=\"noopener\">Watch the on-demand webinar<\/a><\/p><div class=\"section\"><h2>Strategies for CISOs navigating cybersecurity challenges<\/h2><p>As the digital landscape expands, so do the complexities of managing cybersecurity. We\u2019re seeing a mix of longstanding challenges and new, emerging threats that are putting unprecedented pressure on security professionals worldwide.<\/p><p>Our on-demand webinar provides strategic and operational insights based on extensive research and interviews with over 30 top security professionals from organizations around the globe. Whether you&#8217;re a CISO, a security analyst, or a business leader, these compiled insights will help you navigate the obstacles ahead.<\/p><p>Join Mark Renouf, former BBC journalist and contributor, as he engages with industry experts Tim Rhodes, managing director at Apprize360, and Kim Larsen, CISO at Keepit, to discuss key takeaways from the study, such as:<\/p><ul><li>Decisions to consider as you prepare for both known and unknown threats.\u00a0<\/li><li>Key components of a resilient security framework that adapts to both current needs and future technologies.\u00a0<\/li><li>How to identify solid best practices to embrace.\u00a0<\/li><\/ul><p>\u00a0<\/p><p>\u00a0<\/p><h3>The importance of a data governance framework<\/h3><p>One of the most pressing challenges identified in the webinar is the need for a robust data governance framework. This is highlighted as a top priority by nearly all the CISOs and IT leaders interviewed.<\/p><p><b>Key points:<\/b><\/p><ul><li><b>Customization and scalability:<\/b> Organizations need data governance frameworks tailored to their specific needs, which can grow and evolve with them.<\/li><li><b>Deployment challenges:<\/b> Many leaders struggle with effectively deploying and maintaining these frameworks.\u00a0<\/li><li><b>Foundational role:<\/b> Data governance is foundational to overall cybersecurity strategy, impacting compliance, risk management, and operational efficiency.\u00a0<\/li><\/ul><p>\u00a0<\/p><h3>Data classification: The bedrock of data governance<\/h3><p>Hand in hand with data governance is the need for an effective data classification strategy. This is emphasized as a critical step before any governance framework can be successfully implemented.<\/p><p><b>Key points:<\/b><\/p><ul><li><b>Foundation first:<\/b> Proper data classification is seen as the cornerstone of an effective data governance framework.\u00a0<\/li><li><b>AI and automation:<\/b> While AI and machine learning hold promise for automated data classification, there&#8217;s caution about relying too heavily on these technologies without thorough vetting.\u00a0<\/li><li><b>Simplification:<\/b> Effective data classification frameworks should avoid complexity, making them easy to understand and use across the organization.\u00a0<\/li><\/ul><p>\u00a0<\/p><h3>Board involvement in cybersecurity<\/h3><p>Another major theme is the crucial role of board involvement in cybersecurity strategy. Despite its importance, many organizations still lack adequate board engagement in this area.<\/p><p><b>Key points:<\/b><\/p><ul><li><b>Risk integration:<\/b> Boards need to integrate cybersecurity risks into their overall risk management strategies.\u00a0<\/li><li><b>Education and engagement:<\/b> CISOs often need to educate board members about cybersecurity threats and the importance of proactive strategies.\u00a0<\/li><li><b>Strategic role:<\/b> Cybersecurity should be a regular item on board agendas, influencing broader business decisions.\u00a0<\/li><\/ul><p>\u00a0<\/p><h3>Defensible security strategies<\/h3><p>CISOs are increasingly focusing on creating defensible security strategies rooted in zero trust principles. This involves continuous threat modeling and analysis, ensuring that security measures can withstand scrutiny and adapt to evolving threats.<\/p><p><b>Key points:<\/b><\/p><ul><li><b>Lifecycle approach:<\/b> Viewing cybersecurity through a lifecycle lens rather than isolated solutions.\u00a0<\/li><li><b>Zero trust:<\/b> Implementing zero trust principles to create a more resilient security posture.\u00a0<\/li><li><b>Continuous improvement:<\/b> Regularly updating and refining security strategies to address new threats.\u00a0<\/li><\/ul><p>\u00a0<\/p><h3>Vendor partnerships: beyond products to solutions<\/h3><p>Effective cybersecurity often depends on strong vendor partnerships. CISOs are looking for vendors who can provide not just products but comprehensive solutions and strategic advice.<\/p><p><b>Key points:<\/b><\/p><ul><li><b>Consultative partnerships:<\/b> CISOs value vendors who act as partners, offering strategic guidance and support.\u00a0<\/li><li><b>Integration and collaboration:<\/b> Vendors should work seamlessly with internal teams and other third-party solutions to provide cohesive security coverage.\u00a0<\/li><li><b>Service and support:<\/b> High levels of service and support from vendors are crucial for maintaining effective security postures.\u00a0<\/li><\/ul><p>\u00a0<\/p><h3>Addressing CISO experience and maturity\u00a0<\/h3><p>The webinar highlights the varying levels of experience and maturity among CISOs, which can significantly impact an organization&#8217;s cybersecurity effectiveness.<\/p><p><b>Key points:<\/b><\/p><ul><li><b>Diverse backgrounds:<\/b> CISOs come from various professional backgrounds, affecting their approach to cybersecurity.\u00a0<\/li><li><b>Rapid impact:<\/b> With an average tenure of 24-36 months, especially in the U.S., CISOs need to make quick, impactful changes.\u00a0<\/li><li><b>Training and development:<\/b> Continuous education and professional development are essential for CISOs to stay ahead of emerging threats.\u00a0<\/li><\/ul><p>\u00a0<\/p><h2>Conclusion\u00a0<\/h2><p>As we navigate the complexities of cybersecurity in 2024, the role of the CISO is more critical than ever. Effective data governance, board involvement, strategic vendor partnerships, and continuous improvement in security strategies are vital. Organizations that prioritize these areas will be better equipped to handle the rising pressures and evolving threats in the cybersecurity landscape.<\/p><p>By integrating these insights into their operations, businesses can enhance their cybersecurity posture, ensuring not only protection but also resilience and strategic advantage in the digital age.\u00a0<\/p><\/div><p><a class=\"cta-btn large emerald-bg\" href=\"https:\/\/www.brighttalk.com\/webcast\/20302\/613476?utm_source=brighttalk-portal&amp;utm_medium=web&amp;utm_content=Keepit&amp;utm_term=search-result-2&amp;utm_campaign=webcasts-search-results-feed\" target=\"_blank\" rel=\"noopener\">Watch the on-demand webinar<\/a><\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"50842\" class=\"elementor elementor-50842\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c1043a3 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"c1043a3\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c911d7d\" data-id=\"c911d7d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-026fa41 elementor-widget elementor-widget-text-editor\" data-id=\"026fa41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Keepit<\/strong><br \/>At Keepit, we believe in a digital future where all software is delivered as a service. Keepit\u2019s mission is to protect data in the cloud Keepit is a software company specializing in Cloud-to-Cloud data backup and recovery. Deriving from +20 year experience in building best-in-class data protection and hosting services, Keepit is pioneering the way to secure and protect cloud data at scale.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Introduction\u00a0 Cybersecurity is no longer a siloed conce [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[853,1273,61],"tags":[854,1272],"class_list":["post-79084","post","type-post","status-publish","format-standard","hentry","category-keepit","category-1273","category-press-release","tag-keepit","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What\u2019s keeping CISOs up at night? - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s keeping CISOs up at night? - Version 2\" \/>\n<meta property=\"og:description\" content=\"Introduction\u00a0 Cybersecurity is no longer a siloed conce [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-15T10:31:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/images.prismic.io\/keep-it\/ZmlUPpm069VX1qVT_ciso-strategies-blog-93-square.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/strategies-for-cisos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/06\\\/whats-keeping-cisos-up-at-night\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"What\u2019s keeping CISOs up at night?\",\"datePublished\":\"2024-06-15T10:31:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/06\\\/whats-keeping-cisos-up-at-night\\\/\"},\"wordCount\":849,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/strategies-for-cisos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/ZmlUPpm069VX1qVT_ciso-strategies-blog-93-square.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\",\"keywords\":[\"Keepit\",\"2024\"],\"articleSection\":[\"Keepit\",\"2024\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/06\\\/whats-keeping-cisos-up-at-night\\\/\",\"url\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/strategies-for-cisos\\\/\",\"name\":\"What\u2019s keeping CISOs up at night? - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/strategies-for-cisos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/strategies-for-cisos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/ZmlUPpm069VX1qVT_ciso-strategies-blog-93-square.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\",\"datePublished\":\"2024-06-15T10:31:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/strategies-for-cisos\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.keepit.com\\\/blog\\\/strategies-for-cisos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/strategies-for-cisos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/ZmlUPpm069VX1qVT_ciso-strategies-blog-93-square.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\",\"contentUrl\":\"https:\\\/\\\/images.prismic.io\\\/keep-it\\\/ZmlUPpm069VX1qVT_ciso-strategies-blog-93-square.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.keepit.com\\\/blog\\\/strategies-for-cisos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What\u2019s keeping CISOs up at night?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s keeping CISOs up at night? - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/","og_locale":"en_US","og_type":"article","og_title":"What\u2019s keeping CISOs up at night? - Version 2","og_description":"Introduction\u00a0 Cybersecurity is no longer a siloed conce [&hellip;]","og_url":"https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/","og_site_name":"Version 2","article_published_time":"2024-06-15T10:31:21+00:00","og_image":[{"url":"https:\/\/images.prismic.io\/keep-it\/ZmlUPpm069VX1qVT_ciso-strategies-blog-93-square.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/06\/whats-keeping-cisos-up-at-night\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"What\u2019s keeping CISOs up at night?","datePublished":"2024-06-15T10:31:21+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/06\/whats-keeping-cisos-up-at-night\/"},"wordCount":849,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keep-it\/ZmlUPpm069VX1qVT_ciso-strategies-blog-93-square.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800","keywords":["Keepit","2024"],"articleSection":["Keepit","2024","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/06\/whats-keeping-cisos-up-at-night\/","url":"https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/","name":"What\u2019s keeping CISOs up at night? - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/#primaryimage"},"image":{"@id":"https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/#primaryimage"},"thumbnailUrl":"https:\/\/images.prismic.io\/keep-it\/ZmlUPpm069VX1qVT_ciso-strategies-blog-93-square.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800","datePublished":"2024-06-15T10:31:21+00:00","breadcrumb":{"@id":"https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/#primaryimage","url":"https:\/\/images.prismic.io\/keep-it\/ZmlUPpm069VX1qVT_ciso-strategies-blog-93-square.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800","contentUrl":"https:\/\/images.prismic.io\/keep-it\/ZmlUPpm069VX1qVT_ciso-strategies-blog-93-square.png?auto=format,compress?auto=compress,format&amp;rect=0,0,1203,1203&amp;w=800&amp;h=800"},{"@type":"BreadcrumbList","@id":"https:\/\/www.keepit.com\/blog\/strategies-for-cisos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"What\u2019s keeping CISOs up at night?"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kzy","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/79084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=79084"}],"version-history":[{"count":5,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/79084\/revisions"}],"predecessor-version":[{"id":79140,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/79084\/revisions\/79140"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=79084"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=79084"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=79084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}