PRO+ Premium Content/Information Security
Access your Pro+ Content below.
CISOs map out their cybersecurity plan for 2018
This article is part of the Information Security issue of February 2018, Vol. 20, No. 1
When Omar F. Khawaja compiled his priority list for 2018, he didn't include which security technologies he wanted or how many IT staff he hoped to hire. Instead, the CISO at Highmark Health -- a healthcare management and insurance provider whose portfolio includes Allegheny Health Network, United Concordia Dental and Visionworks, among others -- articulated an overarching strategy on how the cybersecurity plan should fit within the national organization's business strategy. "While I do realize that I will need technology to enable many of the things I'm trying to do [this] year and going into 2019, my goal isn't to deploy technology, but to realize certain outcomes," said Khawaja, who works out of Highmark's Pittsburgh headquarters. Khawaja broke his cybersecurity plan down into five key areas of focus. First, he wants to look at how his team makes decisions. "There are always more opportunities to make more impact and add more controls than there are the resources and time to do so," he said. "So how do we create a ...
Features in this issue
-
CISOs map out their cybersecurity plan for 2018
What's on the short list for enterprise cybersecurity programs in the coming year? As attack vectors increase -- think IoT -- we ask information security leaders to discuss their plans.
-
David Neuman: The CISO position and keeping the cloud safe
The Rackspace CISO joined the enlisted ranks in the Air Force, eventually becoming an officer with global responsibilities before moving to the private sector.
Columns in this issue
-
Data protection compliance costs less than noncompliance
Smaller companies -- with fewer than 5,000 employees -- in particular may be hit hard by GDPR requirements and other data compliance hurdles. A new report does the math.
-
Fred Cohen on strategic security: 'Start with the assumptions'
Cohen is a globally recognized expert in information protection and cybersecurity. Since coining the term 'computer virus,' he has remained a pioneer in information assurance.