Citadel Information Group

  • Home
  • About Us
    • About Citadel
    • Who We Are
    • When To Call Citadel
  • Services
    • Overview: Delivering Information Peace of Mind ® to Business and the Nonprofit Community
    • Citadel’s Information Peace of Mind ® Program
    • Assessments and Reviews
    • Information Security Policies and Standards
    • Secure The Human
    • Phishing Defense Training
    • CCPA and Defendable Security Procedures and Practices
    • Privacy: Information Inventory / Data Mapping
    • Security Management of the IT Network / Infrastructure
    • Incident Response / Business Continuity
    • Secure Application Development — Learn By Doing
    • Litigation Support
    • Keynotes
    • Client Success Stories
  • Blog
  • Resources
    • Information Security Library
      • Citadel Guides
      • Awareness Posters
      • For Boards and the C Suite
      • Cybersecurity Law
      • Cybersecurity Surveys
      • HIPAA HITECH
      • Insurance and Risk Management
      • National Cybersecurity
      • Online Bank Security
      • Payment Card Industry Data Security Standard
      • Personal Cybersecurity
      • Securing the IT Network
      • Helpful Links
    • Blogs
      • Cybersecurity Blogs
      • Leadership and Culture Change Blogs
  • Contact
You are here: Home / Resources / Information Security Library / For Boards and the C Suite

For Boards and the C Suite

Board Governance

  • Overcoming stubborn execs for security sake. CSO, January 7, 2016
  • Cybersecurity and the Twenty-First Century Board of Directors. Huffington Post, December 31, 2015
  • What The Boardroom Thinks About Data Breach Liability. Dark Reading, November 6, 2015
  • What Cybersecurity Questions Are Boards Asking CISOs? Security Intelligence, October 23, 2015
  • Why Corporate Boards Are Picking Women to Fill Cybersecurity Posts, Bloomberg Business, October 22, 2015
  • How do you translate data security information to the board?, Information Age, October 22, 2015
  • Do boards of directors actually care about cybersecurity?, CSO, September 1, 2015
  • Cybersecurity on the agenda for 80 percent of corporate boards, CSO, May 28, 2015
  • Boards Dissatisfied with Cyber, IT Risk Info Provided by Management, Security Week, January, 2, 2015
  • Managing Cyber Risk: Job #1 for Directors and General Counsel, FTI Journal, July 2014
  • The Board’s Role in Cybersecurity, Richard Clarke and Jacob Olcott, The Conference Board, March 2014
  • Cybersecurity — A Board Primer, BDO Board Reflections, Winter 2014
  • Cyber Risk and the Board of Directors—Closing the Gap, Michael Gold, Bloomberg Law, October 2013
  • 2013 NACD Advisory Council on Risk Oversight Summary of Proceedings. NACD, May 2013
  • CISOs Must Engage the Board About Information Security. CIO May 31, 2013
  • Unbalanced alignment. Information security needs to become a board-level priority and its executives need to have a seat at the boardroom table. Ernst & Young 2012 Global Information Security Survey – Fighting to close the gap, October 2012
  • Clueless’ boards risk lawsuits, threaten national security. Network World, May 23, 2012
  • Boards Are Still Clueless About Cybersecurity. Forbes Magazine, May 16, 2012
  • Governance of Enterprise Security – Carnegie Mellon University – CyLab Report, 2012

Citadel Cybersecurity White Papers and Management Guides

  • The Human Factor in Information Security – Kim Pease, Citadel Information Group & Michael Kemps, Innovative Computing Systems, Law Journal Newsletter, December 2016
  • Effectively Managing Information Security Risk
  • Success Strategy for Infosec Planning and Implementation
  • Seven Requirements for Successfully Implementing Information Security Policies, 2012
  • Beyond Awareness Training, It’s Time to Change the Culture
  • Can You Prevent Hackers from Taking Over Websites – Web-Site Security Basics
  • Memo: Mitigating the Risk of Disciplining IT Staff
  • Protecting your Business from the Social Network Threat

Other Management Guidelines

  • Framework for Improving Critical Infrastructure Cybersecurity, Version 1.0, National Institute of Standards and Technology (NIST), February 2014
  • Cybersecurity Framework, General Information Page, NIST
  • 10 Social Media Must Haves for Corporate Compliance and Ethics, Michelle Sherman, 2011
  • US CERT Common Sense Guide to Prevention and Detection of Insider Threats (2005)
  • Fraud Advisory for Businesses-Corporate Account Take Over, FS-ISAC, 101018
  • ISSA Generally Accepted Information Security Practices (2004)
  • ISACA Information Security Governance Guidance for Boards of Directors and Executive Management 2001
  • Information Security Governance National Cybersecurity Partnership, 2004
  • Information Security Governance, PPT-charts, National Cybersecurity Partnership, 2004
  • NSA Defense In Depth
  • Protecting Consumer Privacy in an Era of Rapid Change, FTC, 2012
  • Securing Cyberspace Business Roundtables Framework for the Future, 2004
  • NIST-7621 Small Business Information Security Fundamentals (2009)

Call us for a free confidential consultation:
323-428-0441

Get our newsletter

A weekly report of critical security updates and the latest cybersecurity news delivered to your inbox from Secure The Village.

Sign Up

Resources

  • Information Security Library
    • Citadel Guides
    • Awareness Posters
    • For Boards and the C Suite
    • Cybersecurity Law
    • Cybersecurity Surveys
    • HIPAA HITECH
    • Insurance and Risk Management
    • National Cybersecurity
    • Online Bank Security
    • Payment Card Industry Data Security Standard
    • Personal Cybersecurity
    • Securing the IT Network
    • Helpful Links
  • Blogs

Get in touch

323 428 0441
info@citadel-information.com

Citadel Information Group
Citadel on Linkedin
SecureTheVillage on Linkedin

About Us

Citadel Information Group is a full service integrated information security management / governance firm. We work either consultatively or as part of a client’s senior management team, assisting our clients cost-effectively manage the confidentiality, privacy, integrity and availability of their information. Learn more.

Key Resources

  • The Citadel Way to Information Security Management
  • Creating a Cybersecurity Aware Culture
  • Secure Application Development: The CISO’s Role – a webinar with WhiteHat Security
  • Information Security Library

Copyright © 2018 by Citadel Information Group  All Rights Reserved | Privacy Policy