CISO Next: Your Guide to Secure Data Future Our world today As the data privacy challenges of the digital age change and evolve, so must the role of the CISO. The status quo won’t suffice.CISOs must tackle the complexities of the:Speed of technology innovationDynamic regulatory landscapeEvolving cyber threatsSecurity talent gapManagement of economic expectationsTo succeed, the CISO role demands adaptation to environmental needs, adoption of new approaches, and strategic reframing of their role within an organisation. Such development inspires reflection – understanding one’s strengths, one’s growth opportunities, and how best to learn from and with fellow CISOs. Take our survey Connecting CISOs and thought leaders What is CISO NEXT? CISO Next connects CISOs and data security and privacy thought leaders to explore and shape how their role will evolve in the current and future business landscape. The CISO Next initiative provides diverse perspectives, innovative tools for collaboration and cross-industry resources that enable security leaders to effectively address the known and unknown challenges in a dynamic cyber threat landscape and strengthen cybersecurity defence and resilience.Participating CISOs are empowered to:Network and collaborate with fellow CISOsAcquire innovative methods to tackle current challenges in data security and privacy and build solutions for the futureExpand their toolbox by gaining insight into different CISO personas and approachesTap into a knowledge sharing community Download brochure 3 easy steps to get involved What is next for CISOs? Getting involved in CISO Next takes three easy steps:Explore our latest thought leadership sharing key CISO topics and themesTake our brief survey to find out “What is your CISO type?”Reach out to us directly to learn about upcoming CISO-exclusive roundtables tailored to your industry and/or geography 3 easy steps to get involved Combining design thinking with deep expertise What makes CISO Next unique? The CISO Next initiative produces content and events crafted exclusively for CISOs, with CISOs. The resources focus on what CISOs need to succeed in your role. Protiviti values a CISOs time, so we are intentional with our events. If you join an event, expect a deep dive into the real problems of data security and privacy solutions that matter to you.Security is constantly changing, which requires both short and long-term agility and development. CISO Next connects CISOs regularly to nurture peer relationships and create a safe, creative space to discuss the most relevant challenges facing CISOs.But wait, there’s more!In security, models have been upgraded for how to architect our environments, secure our assets and build our applications, but have struggled to update the model of how to plan for the future.CISO Next intentionally couples a contemporary brainstorming model – design thinking – with deep subject matter expertise to drive the security conversation forward.Design thinking is a process and a mindset. When designing new solutions, we commit to trying something new. Thinking like a designer gives permission to fail and to learn from our mistakes. New ideas are generated, feedback received, then iterated; sharing the results with the CISO community. Featured thought leadership for CISOs Establishing a scalable AI governance framework Establishing an AI governance structure paves the way for effective management and measurement of AI solutions, fostering innovation while mitigating risk. Read more Former CISO on what boards are getting wrong about data protection and privacy In this VISION by Protiviti interview, Joe Kornik, Editor-in-Chief of VISION by Protiviti, sits down with Sue Bergamo. Bergamo is an executive advisor, former CIO, CISO, and Global Technology Strategist for Microsoft. Read more NIST unveils post-quantum cryptography standards. What does it mean? Earlier this month, the National Institute of Standards and Technology (NIST) approved three post-quantum cryptography (PQC) standards that constitute the first significant steps towards protecting critical services from quantum computers being used to break the encryption of sensitive and classified information for both business and government. Read more CFOs Address a Data Security and Privacy Triple Threat CFOs prioritise addressing the trifecta of data security and privacy threats due to rising cyber warfare, extortion risks, and stringent regulatory requirements. Read more Podcast | Is Post-Quantum Cryptography at Risk? Is post-quantum cryptography safe from quantum computing? Do we really need thousands of qubits to attack RSA? We examine some of the challenges to PQC strength and timeline that have recently emerged in scientific papers and consider what makes peer review such a crucial part of the process. Listen now 5 Tips to Navigate Security in Agile Development In today’s fast-paced digital landscape, DevOps practices have revolutionised software development and deployment, allowing organisations to achieve greater efficiency and agility. Read more