<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 16 Apr 2026 01:46:00 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/created/ciso/rss.xml" rel="self" type="application/rss+xml"/><item><title><![CDATA[When is the Right Time to Hire a CISO?]]></title><description><![CDATA[Knowing when to hire a CISO is a challenging proposition – one which most organizations will eventually need to answer. The need to hire a CISO depends on a combination of factors, including but not limited]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/when-is-the-right-time-to-hire-a-ciso</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/when-is-the-right-time-to-hire-a-ciso</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 10 Sep 2025 21:36:30 GMT</pubDate><enclosure url="https://images.ecency.com/p/BgxWBRxjvNhoPtViA6QihgPp4M4SvDVGGjiApSp9ujGsZXt6XF1HELnq6STub8tzVGwCuPr4GwoMfc5SCVde2i39sWvPGeYByo7AFW38oHUV92nmAmHtzYLQeHof5FhqHwBmV1xG8kQrV3jFEYtn2A1QinHFgkFUpBCwys6pC6L55H8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[The Fallacy of Perfect Cybersecurity]]></title><description><![CDATA[Perfect cybersecurity is not being impervious to attack! Rather, it is the optimal balance between the costs, friction it introduces, and the acceptable residual risks. If we accept unreasonable goals,]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/the-fallacy-of-perfect-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/the-fallacy-of-perfect-cybersecurity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Wed, 07 May 2025 15:53:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45dtC5qs39GbttWCsJpDv2LrronEojfc6qhok?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Boards Care About Cybersecurity!]]></title><description><![CDATA[Hear what Rinki Sethi, VP & CISO and board member, has a lot to say about how cybersecurity will shift in 2025! Check out her thoughts on Artificial Intelligence, how the Board views cybersecurity,]]></description><link>http://direct.ecency.com/cybersecurity/@mrosenquist/boards-care-about-cybersecurity</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@mrosenquist/boards-care-about-cybersecurity</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[mrosenquist]]></dc:creator><pubDate>Thu, 20 Feb 2025 19:47:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/S5Eokt4BcQdk7EHeT1aYjzebg2hC7hkthT45eLQoUXKm4rdbREvaDBkD5n4YDtB9xBD78Wi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[4 Phases of Cybersecurity Maturity]]></title><description><![CDATA[There are four typical evolutionary maturity levels for cybersecurity programs. The benefits and drawbacks of each phase creates a natural tension that pulls organizations forward to become better at managing]]></description><link>http://direct.ecency.com/hive-138876/@mrosenquist1/tvycllxh</link><guid isPermaLink="true">http://direct.ecency.com/hive-138876/@mrosenquist1/tvycllxh</guid><category><![CDATA[hive-138876]]></category><dc:creator><![CDATA[mrosenquist1]]></dc:creator><pubDate>Mon, 13 Sep 2021 18:30:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/KWcVEiwEzuiCuSxBHEf42JyWvZsZ7iHiL2G9DgNystnQNAaWwvaped7iYohqEabjCLfsEBeCqWXD5SEgSi?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Where should a CISO report into?]]></title><description><![CDATA[Where should a CISO report into within an organization? No common standard exists as we can find them operating under many different organizations, including IT, Legal, the CTO, and CEO just to name a]]></description><link>http://direct.ecency.com/hive-138876/@mrosenquist1/ugksqngc</link><guid isPermaLink="true">http://direct.ecency.com/hive-138876/@mrosenquist1/ugksqngc</guid><category><![CDATA[hive-138876]]></category><dc:creator><![CDATA[mrosenquist1]]></dc:creator><pubDate>Mon, 03 May 2021 16:15:09 GMT</pubDate><enclosure url="https://images.ecency.com/p/368La1qZAv72LaDnPi7unoyebf82PrctVf3ygNzCmTovq2wGg3TqJmnwGNdda7N3zybGHXvpmC7DE2tmFanqEa6z?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[3 Reasons Chief Information Security Officers (CISOs) Are Increasingly Stressed at Work]]></title><description><![CDATA[There’s no doubt that stress is one of the most common problems people are dealing with nowadays and, in most cases, it’s work related. For some of them, like chief information security officers (CISOs),]]></description><link>http://direct.ecency.com/knowledgemanagement/@vivic5dzp/3-reasons-chief-information-security-officers-cisos-are-increasingly-stressed-at-work</link><guid isPermaLink="true">http://direct.ecency.com/knowledgemanagement/@vivic5dzp/3-reasons-chief-information-security-officers-cisos-are-increasingly-stressed-at-work</guid><category><![CDATA[knowledgemanagement]]></category><dc:creator><![CDATA[vivic5dzp]]></dc:creator><pubDate>Thu, 18 Jul 2019 12:17:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/6pu4ZRycQdDVScudzd6MCPSXks2Yb5eBsm266mkDh4Ym6FLa7vocrivSjrpEC6RmimFbgnXKSAuwF4FLb5D1R8PNCXFS7MEoDEgCTp8cQa6ZuY4Yq2ca9Hw7qDbNx4Xtc6K77kBU57P1oRdracz3VK2US7VbCKgpnPyKgwS3Pt5nwB1RsmShycu44FWpxzu65jY86?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Cyber Risk Training – CISA, CISO, CISM, CISSP and SSCP]]></title><description><![CDATA[After months of hard work and dedication, we are excited to officially announce the launch of our new website! – www.cyberrisk1k.com We offer Global Cyber Risk Training – CISA, CISO, CISM, CISSP and SSCP.]]></description><link>http://direct.ecency.com/cybersecurity/@giveandtake638/cyber-risk-training-cisa-ciso-cism-cissp-and-sscp</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@giveandtake638/cyber-risk-training-cisa-ciso-cism-cissp-and-sscp</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[giveandtake638]]></dc:creator><pubDate>Thu, 16 Aug 2018 21:59:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/RGgukq5E6HBM2jscGd4Sszpv94XxHH2uqxMY9z21vaqHt3FijGBEMfro71rvcKmv8rK9dPaDx2r5FZqBPQcyFikRDr9maojbqdrvaHfALtRs1C4ZPUXh5PMmuZsrv1C?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[[상절티사] 상대적이며 절대적인 Tworld 사전의 보안이야기 "2018년 보안 위협?"]]></title><description><![CDATA[[상대적이며 절대적인 Tworld 사전] 안녕하세요, 이것 저것 제가 하고 싶은 이야기를 적는 @tworld 입니다. 대문을 만들어주신 @sunshineyaya7 작가님 너무 감사 드립니다! 2018년이 이제 몇일 남지 않았습니다. 보안, Security의 issue 들을 보자면 2017년 한해 정말 다사다난 했던 것 같습니다. 다가올 2018년도 마찬가지라고]]></description><link>http://direct.ecency.com/kr-security/@tworld/7hwhnz-tworld-2018</link><guid isPermaLink="true">http://direct.ecency.com/kr-security/@tworld/7hwhnz-tworld-2018</guid><category><![CDATA[kr-security]]></category><dc:creator><![CDATA[tworld]]></dc:creator><pubDate>Thu, 28 Dec 2017 04:05:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/cyxkEVqiiLyAJMrzqHfWLT7YbdgoprDQGwdeDRwrHsWXvvWKQqzsuoYT3fGZa9trR26dKLYF9LE3aNfLCHCdbd1xxuiDTC7Dpx9pCjneREJC9vXFFb7ki5vr7umrxnseZjU?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>