{"id":2669,"date":"2012-07-16T10:21:29","date_gmt":"2012-07-16T17:21:29","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=2669"},"modified":"2012-07-16T10:21:29","modified_gmt":"2012-07-16T17:21:29","slug":"getting-the-ciso-a-seat","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2012\/07\/getting-the-ciso-a-seat\/","title":{"rendered":"Getting the CISO a Seat"},"content":{"rendered":"<p>For those of you in the security industry for five years and more, you\u2019ll remember the days when security was an afterthought. As security tadpoles, we had to fight for our fair share of the IT budget, and in many cases, security was deprioritized over some other initiative. That fight has evolved somewhat;\u00a0in fact,\u00a0we\u2019re winning many more fights due to the recent high-profile, sophisticated breaches in the news. Now, security is getting more visibility, and there is a better understanding of the need for next-generation security solutions like next-generation firewalls in protecting your network.<\/p>\n<p>The reality however, is that the battle for the fair share of the IT budget starts in the boardroom. Transitioning security from a culture of \u201cno\u201d, to a business-enabling function, where security awareness permeates every part of the organization is how we win. Today\u2019s great CISOs aren\u2019t just experts in security, they are experts at how security must be architected to support business needs. Check out this <a href=\"http:\/\/www.securityweek.com\/getting-ciso-seat\" rel=\"nofollow,noopener\" >SecurityWeek<\/a> article for this emerging breed of CISOs and how they are getting a seat at the table.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For those of you in the security industry for five years and more, you\u2019ll remember the days when security was an afterthought. As security tadpoles, we had to fight for our fair &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[89],"tags":[94],"coauthors":[771],"class_list":["post-2669","post","type-post","status-publish","format-standard","hentry","category-ciociso","tag-ciso"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=2669"}],"version-history":[{"count":6,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2669\/revisions"}],"predecessor-version":[{"id":2677,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/2669\/revisions\/2677"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=2669"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=2669"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=2669"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=2669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}