{"id":317,"date":"2023-04-16T22:36:29","date_gmt":"2023-04-16T22:36:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/?p=317"},"modified":"2023-04-16T22:36:29","modified_gmt":"2023-04-16T22:36:29","slug":"managing-as-a-ciso","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/2023\/04\/16\/managing-as-a-ciso\/","title":{"rendered":"Managing as a CISO"},"content":{"rendered":"\n<p>Introduction<br>There is a lot that goes into maintaining a budget and training as a Chief Information<br>Security Officer. Being a Chief Information Security Officer you have responsibilities such as<br>hiring management, training, security, technology, and more. Maintaining all these<br>responsibilities comes with a budget. There are also repercussions when the balance isn\u2019t<br>maintained between training and additional cybersecurity technology.<br>Managing a Budget<br>Having a plan or an organizer for everything under the budget for a CISO is essential. Human<br>training is quite important to cybersecurity because human error can cause companies to fall to error or<br>cyber attacks. Cybersecurity technology is just as important, without a good system there will be many<br>errors, and everything will be prone to attack even with well trained employees. As CISO I would put<br>more money toward Cybersecurity technology over training employees. The trade off would be less well<br>trained employees, but more advanced technology. My reasoning for this is because with a very good<br>system and technology security even with human error things such as strong firewalls, and other<br>technology security measures data will be secured.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IntroductionThere is a lot that goes into maintaining a budget and training as a Chief InformationSecurity Officer. Being a Chief Information Security Officer you have responsibilities such ashiring management, training, security, technology, and more. Maintaining all theseresponsibilities comes with a budget. There are also repercussions when the balance isn\u2019tmaintained between training and additional cybersecurity technology.Managing&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/2023\/04\/16\/managing-as-a-ciso\/\">Read More<\/a><\/div>\n","protected":false},"author":26175,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/posts\/317"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/users\/26175"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/comments?post=317"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/posts\/317\/revisions"}],"predecessor-version":[{"id":318,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/posts\/317\/revisions\/318"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/media?parent=317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/categories?post=317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-eportfolio\/wp-json\/wp\/v2\/tags?post=317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}