James Christiansen

Vice President, Information Risk Management

James Christiansen is a seasoned business leader with deep technical expertise and is recognized as a global thought leader. As the vice president of information risk management and member of the Office of the CISO, Christiansen helps CXOs make executive decisions based on the balance of risk and cost. He is responsible for developing and delivering a comprehensive suite of strategic services and solutions to help CXO executives change their security strategies through innovation.

 

Incident Response: Preparation is the Name of the Game, Until Your Plans Change

· By James Christiansen, Jeff Horne · 0 Comments

The NHL and NBA playoffs are in full swing now with sports analysts and millions of crazed fans assessing and re-assessing every move the players make and critiquing every mistake. Things are no different when going through an incident response effort in the information security world.

Continue reading 0 Shares

Offense Wins Games…Defense Wins Championships: Tips to Build Your Security Strategy. Part Three – Post-Game Show

· By James Christiansen · 0 Comments

The preparation took months and a lot of blood, sweat and tears went into reaching the championship game. It’s over in a blink. The fireworks go off, trophies are handed out - and you hear it all from a silent locker room.

Continue reading 0 Shares

Offense Wins Games…Defense Wins Championships: Tips to Build Your Security Strategy. Part Two – Game Day!

· By James Christiansen, Jason Clark · 0 Comments

Now it’s game day for your team. They have gathered in the locker room for pre-game meetings, rituals and pep-talks by fellow coaches and team captains. The time has come for them to execute on the game plan that has been laid-out, practiced and approved by team management. The adrenaline is pumping … scenarios of how the game will play out running through the heads of the coaches, players and fans. Will the preparation be enough?

Continue reading 0 Shares

Offense Wins Games…Defense Wins Championships: Tips to Build Your Security Game Plan

· By James Christiansen, Jason Clark · 0 Comments

Avid sports fans from around the country are eagerly awaiting the much anticipated Super Bowl match-up between the New England Patriots and the Seattle Seahawks this Sunday. As fans prepare by stocking up on snacks and putting their beer on ice, the Super Bowl bound teams are “in the zone” preparing for one of the biggest games of their careers.

Continue reading 0 Shares

Empowering the CISO

· By James Christiansen · 0 Comments

A security-focused business culture can empower the CISO to effectively perform their job, and allow them to become a respected member of the “C” level. As a result, they are able to implement a business-aligned security program that brings real value to the company.

Continue reading 0 Shares

Building a Security-Focused Business Culture

· By James Christiansen · 0 Comments

In the recent months, we have seen a disturbing thread in companies hit by major security breaches. In many cases, the problem can be attributed to a number of things; an internal security function that was never properly built, inadequate funding, existing leadership that was not empowered, or existing security leaders deciding to move on to other companies.

Continue reading 0 Shares

The Key to a Strong IT Security Program

· By James Christiansen · 0 Comments

Over the years, I have worked in top positions in the security departments of several major enterprises, which has given me insight into what separates a really strong IT security organization from one that’s just average. I’ve learned that there are key characteristics that IT security managers should try to implement into their organization to build more successful security programs.

Continue reading 0 Shares

A CISO Needs a Plan

· By James Christiansen · 0 Comments

I had the opportunity to talk with Tim Wilson on Dark Reading Radio recently. The topic we discussed is one that cannot be overemphasized these days given the number and magnitude of data breaches that have been disclosed in recent months: building security programs for large enterprises.

Continue reading 0 Shares

HealthCare.gov Breach: What Was Really Lost?

· By James Christiansen · 0 Comments

The reported breach of HealthCare.gov is just one of many breaches announced during the past few weeks. Healthcare.gov has sensitive information of millions of Americans, thus any breach in the security of the website could lead to major privacy issues.

Continue reading 0 Shares

Why Are Healthcare Breaches on the Rise? (Part 2)

· By James Christiansen · 0 Comments

In my last blog post, I discussed how the visibility of electronic healthcare records (EHR), and the lucrative financial gain attackers can realize by stealing those records, has led to an increase in healthcare breaches. In this post I will explain why securing the records can be challenging, and what needs to be done in the industry to protect patients’ information.

Continue reading 0 Shares
(18 Results)