<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title><![CDATA[ Executive Decisions RSS Feed]]></title>
        <link>https://www.cshub.com/rss/categories/executive-decisions</link>
        <description><![CDATA[ Cyber Security Hub keeps its finger on the pulse of executive decisions in the space -- from legislation to consortiums and top industry players. ]]></description>
        <language>en</language>
        <pubDate>Fri, 22 May 2026 16:55:26 +0000</pubDate>
        <atom:link href="https://www.cshub.com/rss/categories/executive-decisions" rel="self" type="application/rss+xml"/>
                    <item>
                <title><![CDATA[6 skills modern CISOs must have]]></title>
                <link>https://www.cshub.com/executive-decisions/articles/6-skills-modern-cisos-must-have?utm_medium=RSS</link>
                <description><![CDATA[ CISOs of today must bring many skills to the table to ensure success in a difficult job ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/articles/6-skills-modern-cisos-must-have?utm_medium=RSS</guid>
                <pubDate>Wed, 13 Dec 2023 09:59:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Almost half of businesses plan to cut cyber security headcount]]></title>
                <link>https://www.cshub.com/executive-decisions/news/almost-half-of-businesses-plan-to-cut-cyber-security-headcount?utm_medium=RSS</link>
                <description><![CDATA[ Cyber security decision-makers and practitioners plan to reduce headcounts in response to budget headwinds ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/news/almost-half-of-businesses-plan-to-cut-cyber-security-headcount?utm_medium=RSS</guid>
                <pubDate>Fri, 08 Dec 2023 11:38:47 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Businesses pay over $500,000 for top cyber security talent]]></title>
                <link>https://www.cshub.com/executive-decisions/news/businesses-pay-over-500000-for-top-cyber-security-talent?utm_medium=RSS</link>
                <description><![CDATA[ Salary plays a key role in retaining cyber security talent and building successful security strategies, report suggests ]]></description>
                <author><![CDATA[ michael.hill@iqpc.com (Michael Hill) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/news/businesses-pay-over-500000-for-top-cyber-security-talent?utm_medium=RSS</guid>
                <pubDate>Fri, 08 Dec 2023 09:00:43 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[The top 25 leaders in cyber security 2024]]></title>
                <link>https://www.cshub.com/executive-decisions/articles/top-25-leaders-cyber-security?utm_medium=RSS</link>
                <description><![CDATA[ Get to know the most influential people in cyber security right now ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/articles/top-25-leaders-cyber-security?utm_medium=RSS</guid>
                <pubDate>Fri, 20 Oct 2023 08:40:58 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Analysing the importance of human centric design in control and process design o...]]></title>
                <link>https://www.cshub.com/executive-decisions/videos/analysing-the-importance-of-human-centric-design-in-control-and-process-design-of-cyber-security-2?utm_medium=RSS</link>
                <description><![CDATA[ How to use human-centric design to create controls and processes that are more effective and easier to use for employees ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/videos/analysing-the-importance-of-human-centric-design-in-control-and-process-design-of-cyber-security-2?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:38 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Applying a comprehensive, mature, and measurable zero-trust program]]></title>
                <link>https://www.cshub.com/executive-decisions/videos/applying-a-comprehensive-mature-and-measurable-zero-trust-program?utm_medium=RSS</link>
                <description><![CDATA[ How to support security tools with simple processes and great usability for maximum security efficacy ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/videos/applying-a-comprehensive-mature-and-measurable-zero-trust-program?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:38 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Raising cyber awareness and assessing the behavioural impact]]></title>
                <link>https://www.cshub.com/executive-decisions/videos/raising-cyber-awareness-and-assessing-the-behavioural-impact?utm_medium=RSS</link>
                <description><![CDATA[ Learn more about the behavioural implications of cyber security and the role we play in responsibility and accountability ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/videos/raising-cyber-awareness-and-assessing-the-behavioural-impact?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:38 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Creating representative cyber security workforce]]></title>
                <link>https://www.cshub.com/executive-decisions/videos/creating-representative-cyber-security-workforce?utm_medium=RSS</link>
                <description><![CDATA[ Why gender diversity is integral to cyber security and how to encourage it within the industry ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/videos/creating-representative-cyber-security-workforce?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:38 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Dispelling the stereotypes about cyber security]]></title>
                <link>https://www.cshub.com/executive-decisions/interviews/dispelling-the-stereotypes-about-cyber-security?utm_medium=RSS</link>
                <description><![CDATA[ Michelle Garcia, director of IT security and compliance at Carnival Cruises, on why dispelling stereotypes can encourage more women to go into cyber security ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/interviews/dispelling-the-stereotypes-about-cyber-security?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:19:27 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[Italy bans ChatGPT over data privacy concerns]]></title>
                <link>https://www.cshub.com/executive-decisions/news/italy-bans-chatgpt-over-data-privacy-concerns?utm_medium=RSS</link>
                <description><![CDATA[ An Italian Data Privacy Agency has called a temporary ban on ChatGPT over concerns it may violate GDPR laws ]]></description>
                <author><![CDATA[ olivia.powell@iqpc.co.uk (Olivia Powell) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/news/italy-bans-chatgpt-over-data-privacy-concerns?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:10 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How to transform cloud security challenges into business opportunities]]></title>
                <link>https://www.cshub.com/cloud/whitepapers/cisos-guide-cloud-opportunities?utm_medium=RSS</link>
                <description><![CDATA[ To secure enterprise assets in the cloud, CISOs must address new challenges ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/cloud/whitepapers/cisos-guide-cloud-opportunities?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:17:37 +0000</pubDate>
            </item>
                    <item>
                <title><![CDATA[How Covid-19 impacted cyber security challenges, focus and spends]]></title>
                <link>https://www.cshub.com/executive-decisions/articles/cybersecurity-mid-year-report-2020?utm_medium=RSS</link>
                <description><![CDATA[ Practitioner insight on how cyber security challenges, focus and spend was affected by the global pandemic ]]></description>
                <author><![CDATA[  (CSHub.com Editorial Staff) ]]></author>
                <guid>https://www.cshub.com/executive-decisions/articles/cybersecurity-mid-year-report-2020?utm_medium=RSS</guid>
                <pubDate>Tue, 29 Aug 2023 15:18:01 +0000</pubDate>
            </item>
            </channel>
</rss>