Skip to content
Accellion

Accellion

Enterprise Content Firewall

Free Trial Get A Demo
  • English
  • Contact Us
  • Platform
    • Enterprise Content FirewallUnified Security and Compliance for Third Party Communications
    • CISO Dashboard
    • Secure Email
    • Secure File Sharing
    • Secure Mobile Sharing
    • Secure Web Forms
    • Secure Managed File Transfer
    • Remote Work Security
    • Secure Content Access
    • SFTP Server Governance
    • Virtual Data Rooms
    • FTA UpgradeUpgrade Now for Broader Protection and Control
  • Solutions
    • Industries
      • Government
      • Healthcare
      • Financial Services
      • Legal
      • Manufacturing & Engineering
      • Higher Education
    • Roles
      • CISO
      • Sales
      • Customer Support
      • R&D
      • Corporate Finance
      • Corporate Legal
    • Compliance
      • HIPAA
      • GDPR
      • FedRAMP
      • SOC 2
      • FIPS
      • CMMC
      • Data Sovereignty
      • eDiscovery
  • Resources
    • Resource Center
    • Blog
    • Case Studies
    • Customers
    • Customer Success
    • Developer
    • Events
    • eBooks
    • Infographics
    • Product Briefs
    • Videos
    • Webinars (Upcoming)
    • Webinars (Archived)
    • Whitepapers
  • Partners
    • Reseller Locator
    • Technology Partners
    • Channel Partners
  • Company
    • About Us
    • Contact Us
    • Management
    • Investors
    • Press & News
    • Careers
    • Technical Support
  • Reseller Portal
  • Pricing

CISO Perspectives

Futurecon - Dallas

CISOs Enable Business Growth With This Strategy

by Laureen Smith March 19, 2020March 19, 2020 | CISO Perspectives
Can you blame the CISO who wants to quash any tool, system, or process that invites risk into the organization? CISOs face embarrassing data breaches and unceremonious terminations when employees...
Read More right-arrow
FutureCon Dallas

Why a Telephone Might Be the Best Tool to Stem Third Party Cyber Risk

by Laureen Smith March 12, 2020March 18, 2020 | CISO Perspectives
Compliance checklists and attestations only go so far in mitigating cyber risk. They demonstrate a partner’s commitment to cybersecurity awareness however they only capture a snapshot in time. A vendor,...
Read More right-arrow
Chicago cybersecurity leaders

Successful CISOs Use This Essential Tool Sparingly

by Joel York December 16, 2019December 16, 2019 | CISO Perspectives
If you think looking for a needle in a hay stack would be tough, imagine looking for a needle in a needle stack. Not just any needle, but a very...
Read More right-arrow
Alan Levine, CISO for Alcoa (retired)

Want to Be a CISO? Know This First.

by Joel York December 9, 2019December 9, 2019 | CISO Perspectives
From the outside looking in, the CISO career appears pretty glamorous: lots of responsibility, lots of influence, and lots of technology. The reality unfortunately is quite different. Sure, there’s lots...
Read More right-arrow
Claude Schanet, CISO, GovSat Luxembourg

For CISOs, a Zero Trust Security Model Won’t Work Until You Do This First

by Jerome Bei December 2, 2019December 2, 2019 | CISO Perspectives
When it comes to safeguarding organizations and the valuable digital assets they produce, hold, and share, a Zero Trust security model is considered par-excellence. But zero trust comes at a...
Read More right-arrow
Jay Gonzales, CISO, Samsung Semiconductor

CISOs: Focus On These Fundamentals For Long-Term Success

by Laureen Smith November 20, 2019November 20, 2019 | CISO Perspectives
CISO’s clearly have an appetite for complexity. They secure and monitor an expansive ecosystem filled with sanctioned and unsanctioned systems, solutions, and devices. Most of these technologies generate, store or...
Read More right-arrow
Larry Whiteside, Veteran CISO and Cybersecurity Thought Leader

For Healthcare CISOs, There’s No Risk Quite Like This Risk

by Laureen Smith November 11, 2019November 11, 2019 | CISO Perspectives
On one hand, smart devices are a blessing to healthcare, producing valuable data that fuels healthy lifestyles and improves patient care. On the other hand, these devices are a nightmare,...
Read More right-arrow
Philadelphia Data Connectors Cybersecurity Leaders

Think Your Data Is Hard to Protect? These Assets Are Even Harder.

by Joel York October 28, 2019October 28, 2019 | CISO Perspectives
In terms of sensitive information like PII, PHI, and IP, I’ve frequently said you can’t defend what you can’t see. It’s quite common for organizations to have customer data, financial...
Read More right-arrow
Aaron Blackstone, CISO for Texas Department of Public Safety

If Good Help is So Hard to Find, CISOs Find This Next Part Even Harder

by Joel York October 21, 2019October 21, 2019 | CISO Perspectives
Cyber attacks, data breaches and compliance violations are just some of the challenges keeping CISOs up at night. While daunting, these threats are manageable, if you have the budget to...
Read More right-arrow
Jake Margolis, CISO, Metro Water District for So. Cal

For CISOs Who Want to Leave a Lasting Legacy, Take This Advice from William Shakespeare

by Laureen Smith October 14, 2019October 14, 2019 | CISO Perspectives
It’s human nature to model the behavior of those we admire. We dress like them, copy their mannerisms, and subscribe to their philosophies. After all, imitation is the sincerest form...
Read More right-arrow
Dave Snyder, CISO, Independence Blue Cross

The Secret to CISO Success? Do This One Thing Extremely Well

by Joel York October 2, 2019October 2, 2019 | CISO Perspectives
For CISOs who desire the proverbial seat at the table, they must do more than protect the business. They must intimately know the business; how it functions, what are its...
Read More right-arrow
Chicago cybersecurity leaders

CISOs Add Value to the Business By Doing This

by Joel York September 25, 2019September 25, 2019 | CISO Perspectives
If cutting costs is a business imperative, it’s a mystery why CISOs get any budget at all. Yes, the CISO role has long been synonymous with cost. Some might even...
Read More right-arrow
Claude Schanet, CISO, GovSat Luxembourg

CISOs Achieve a Holistic Cybersecurity Program Once They Address This Risk

by Jerome Bei September 18, 2019September 18, 2019 | CISO Perspectives
The rules have changed. Anti-virus software and strong passwords were previously sufficient for protecting intellectual property but not anymore. A more holistic approach is necessary, meaning organizations must exercise extreme...
Read More right-arrow
Laura Whitt-Winyard, Global CISO, DLL

Successful CISOs Spend Lots of Time Doing this One Essential Activity

by Joel York September 11, 2019September 11, 2019 | CISO Perspectives
Knowledge is power. Knowing is half the battle. The way of success is the way of continuous pursuit of knowledge. There are hundreds of inspirational quotes about knowledge, presumably because...
Read More right-arrow
Dallas Cybersecurity Leaders

There’s No Stress Like CISO Stress. Here’s How Some CISOs Cope.

by Joel York August 28, 2019August 28, 2019 | CISO Perspectives
CISO stress is a special kind of stress. It makes sense when you consider all that’s at stake: company revenue, profits, reputation, and customer loyalty. If a company suffers a...
Read More right-arrow

Posts navigation

Next Page

Search

Browse Posts

  • CISO Perspectives37
  • Cyber Security68
  • Compliance12
  • Secure File Sharing23
  • Financial Services5
  • Government4
  • Healthcare5
  • Customer Stories4
  • Accellion News7

Subscribe

Get email updates with our latest blogs news

Popular Posts

  • Accellion’s New Mobile App Provides Senior Executives Enhanced Productivity and SecurityACCELLION NEWS
  • Achieve GDPR Compliance to Comply With EU’s New Data Privacy LawCOMPLIANCE
  • DLP Integration and its Role in Secure File SharingSECURE FILE SHARING
  • Lost and Stolen Mobile Devices Are Leading Cause of Healthcare Data BreachesCYBER SECURITY
  • NIST 800-171 Compliant File Sharing – What You Need to Know and How Accellion Can HelpCOMPLIANCE
Sign up for the latest blog posts and news

Contact Us

Sales

  • +1-650-687-3130
  • [email protected]

Support

  • +1-888-654-3778
  • [email protected]

Stay Connected

  • LinkedIn
  • Facebook
  • Twitter

Platform

  • Platform Overview
  • Communication Consolidation
  • Unified Visibility
  • Unified Security
  • Unified Compliance

Industry

  • Government
  • Healthcare
  • Financial Services
  • Legal
  • Manufacturing and Engineering
  • Higher Education

Capabilities

  • CISO Dashboard
  • Secure File Sharing
  • Secure Email
  • Secure Mobile
  • Remote Work Security
  • Enterprise App Sharing
  • Secure Web Forms
  • Secure Collaboration
  • Virtual Data Rooms
  • Boardroom Communications
  • Secure Managed File Transfer
  • SFTP Server
  • Secure Content Access

Compliance

  • HIPAA
  • GDPR
  • FedRAMP
  • FIPS
  • SOC 2
  • CMMC
  • Data Sovereignty
  • eDiscovery

Resources

  • Resource Center
  • Case Studies
  • Customers
  • eBooks
  • Product Briefs
  • Webinars
  • Whitepapers
  • Developer
  • Blog

Company

  • About Us
  • Contact Us
  • Management Team
  • Investors
  • Partners
  • Press & Media
  • Events
  • Careers
  • Pricing
© 2021

ACCELLION. All rights reserved.

  • Privacy Policy
  • Legal
  • Platform
    • Enterprise Content FirewallUnified Security and Compliance for Third Party Communications
    • CISO Dashboard
    • Secure Email
    • Secure File Sharing
    • Secure Mobile Sharing
    • Secure Web Forms
    • Secure Managed File Transfer
    • Remote Work Security
    • Secure Content Access
    • SFTP Server Governance
    • Virtual Data Rooms
    • FTA UpgradeUpgrade Now for Broader Protection and Control
  • Solutions
    • Industries
      • Government
      • Healthcare
      • Financial Services
      • Legal
      • Manufacturing & Engineering
      • Higher Education
    • Roles
      • CISO
      • Sales
      • Customer Support
      • R&D
      • Corporate Finance
      • Corporate Legal
    • Compliance
      • HIPAA
      • GDPR
      • FedRAMP
      • SOC 2
      • FIPS
      • CMMC
      • Data Sovereignty
      • eDiscovery
  • Resources
    • Resource Center
    • Blog
    • Case Studies
    • Customers
    • Customer Success
    • Developer
    • Events
    • eBooks
    • Infographics
    • Product Briefs
    • Videos
    • Webinars (Upcoming)
    • Webinars (Archived)
    • Whitepapers
  • Partners
    • Reseller Locator
    • Technology Partners
    • Channel Partners
  • Company
    • About Us
    • Contact Us
    • Management
    • Investors
    • Press & News
    • Careers
    • Technical Support
Free Trial Get A Demo
  • English
  • +1-650-763-0741
  • Contact Us
  • Pricing
  • Blog
  • Support
  • Reseller Login