<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
        <title>HTB Blog > CISO Diaries</title>
        <link>https://hackthebox.gr/rss/blog/ciso-diaries</link>
        <description>All the latest news and insights about cybersecurity from Hack The Box. Hacking trends, insights, interviews, stories, and much more</description>
        <language>en</language>
        <atom:link href="https://hackthebox.gr/rss/blog/ciso-diaries" rel="self" type="application/rss+xml" />
        <image>
            <url>
                https://hackthebox.gr/images/landingv3/logo-htb-blog.svg
            </url>
            <title>HTB Blog > CISO Diaries</title>
            <link>https://hackthebox.gr/rss/blog/ciso-diaries</link>
        </image>
                    <item>
                <title>Forrester Q4 2025 Landscape Report: Hack The Box driving AI-ready training &amp; resilience for CISOs</title>
                <link>https://hackthebox.gr/blog/forrester-landscape-report-takeaways</link>
                <description>Continuous skills development over static certifications, preparing for AI-driven attacks, upskilling across IT/OT, and proving resilience. How Hack The Box aligns with and accelerates these</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/Eqo08K8YbLcnKu2SkNejxwwupyT9YbpV.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>CISO Diaries</category>
                <pubDate>Fri, 17 Oct 2025 11:43:00 +0000</pubDate>
                <guid>https://hackthebox.gr/blog/forrester-landscape-report-takeaways</guid>
            </item>
                    <item>
                <title>Why security teams struggle to train—and how to fix it</title>
                <link>https://hackthebox.gr/blog/why-security-teams-struggle-to-train-how-to-fix-it-skills-benchmarking</link>
                <description>Cybersecurity teams struggle to train amid constant threats. This blog explores the challenges and solutions to making structured training a priority.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/cALBZVdcNPWNTk4Qiv25zFlZYg1fHFzZ.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>CISO Diaries</category>
                <pubDate>Wed, 26 Mar 2025 10:09:00 +0000</pubDate>
                <guid>https://hackthebox.gr/blog/why-security-teams-struggle-to-train-how-to-fix-it-skills-benchmarking</guid>
            </item>
                    <item>
                <title>The big 6: Essential financial regulations security leaders should know</title>
                <link>https://hackthebox.gr/blog/cybersecurity-compliance-finance</link>
                <description>In this blog, we cover the biggest international laws and standards security leaders should know about in 2025.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/Si3agEG3DR8FU3fU1SELlhCOTZIgHSHY.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>CISO Diaries</category>
                <pubDate>Tue, 18 Feb 2025 04:04:00 +0000</pubDate>
                <guid>https://hackthebox.gr/blog/cybersecurity-compliance-finance</guid>
            </item>
                    <item>
                <title>How CISO roles have evolved with GRC</title>
                <link>https://hackthebox.gr/blog/ciso-role-evolution</link>
                <description>As cyberattacks become a top-of-mind concern CISOs are having to step up their c-suite presence, prepare for strict reporting requirements, and deal with rising stakes.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/N9oLTxNgOhlLdjQgVxhdXndjVIbf89KK.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>CISO Diaries</category>
                <pubDate>Wed, 24 Jul 2024 12:15:00 +0000</pubDate>
                <guid>https://hackthebox.gr/blog/ciso-role-evolution</guid>
            </item>
                    <item>
                <title>How a technical pro can become a CISO (Chief Information Security Officer)</title>
                <link>https://hackthebox.gr/blog/how-to-become-a-ciso</link>
                <description>Building the bridge between technical pros and CISOs is a challenge made easier when you can do both! Here are the stories behind three CISOs who began as technical cyber pros.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/Afx9HBy8TAl3sTVxKAnvUgpLTLomx6jG.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>CISO Diaries</category>
                <pubDate>Tue, 07 May 2024 16:40:00 +0000</pubDate>
                <guid>https://hackthebox.gr/blog/how-to-become-a-ciso</guid>
            </item>
                    <item>
                <title>CISO board reporting template (to secure C-suite support)</title>
                <link>https://hackthebox.gr/blog/ciso-board-reporting-template</link>
                <description>Learn how to correctly report cybersecurity performance to the board using our free board reporting toolkit!</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/pCpaQvqTK8Z2K3SVvJsyvuDhR4mC1B7N.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>CISO Diaries</category>
                <pubDate>Mon, 29 Apr 2024 11:57:00 +0000</pubDate>
                <guid>https://hackthebox.gr/blog/ciso-board-reporting-template</guid>
            </item>
                    <item>
                <title>How to connect cybersecurity learning outcomes to company goals</title>
                <link>https://hackthebox.gr/blog/how-to-connect-cybersecurity-learning-outcomes-to-company-goals</link>
                <description>Aligning cyber performance with business objectives is vital to gain buy-in and investment from the board.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/PTsFW554QALuz0AekQts8KY8SNr2WxLV.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>CISO Diaries</category>
                <pubDate>Wed, 17 Apr 2024 10:03:00 +0000</pubDate>
                <guid>https://hackthebox.gr/blog/how-to-connect-cybersecurity-learning-outcomes-to-company-goals</guid>
            </item>
                    <item>
                <title>5 step cybersecurity reskilling guide to close skill gaps</title>
                <link>https://hackthebox.gr/blog/5-step-cybersecurity-reskilling-guide</link>
                <description>Cybersecurity leaders can reskill their existing talent into security roles to close skill gaps, retain their best employees, and develop a culture of learning.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/N3JFtqCFi9biVeqJqvvRrEEnUysgCZ0P.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>CISO Diaries</category>
                <pubDate>Wed, 27 Mar 2024 11:44:00 +0000</pubDate>
                <guid>https://hackthebox.gr/blog/5-step-cybersecurity-reskilling-guide</guid>
            </item>
                    <item>
                <title>How CISOs can drive a security culture change</title>
                <link>https://hackthebox.gr/blog/how-cisos-can-drive-a-security-culture-change</link>
                <description>CISOs lead the charge in cybersecurity, from fostering communications to tackling breaches. When crises hit, they&#039;re the answer, but security is a team effort, which demands a culture shift.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/jv5UETd6QxEg90cYEdvLw2SebZc5NXyT.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>CISO Diaries</category>
                <pubDate>Thu, 21 Mar 2024 16:44:00 +0000</pubDate>
                <guid>https://hackthebox.gr/blog/how-cisos-can-drive-a-security-culture-change</guid>
            </item>
                    <item>
                <title>8 metrics to track cybersecurity performance</title>
                <link>https://hackthebox.gr/blog/8-metrics-to-track-cybersecurity-performance</link>
                <description>How can you know that you’re maximizing your cyber performance plans without tracking them? We share key tracking metrics to measure upskilling and gain board support.</description>
                <content:encoded>
                    <![CDATA[
                    <img src="/storage/blog/6iEpM4PP4nxJV76inGUEmfBVJGf7FGCY.jpg" align="left" hspace="5"/>
                    
                ]]>
                </content:encoded>
                <category>CISO Diaries</category>
                <pubDate>Thu, 14 Mar 2024 10:55:00 +0000</pubDate>
                <guid>https://hackthebox.gr/blog/8-metrics-to-track-cybersecurity-performance</guid>
            </item>
            </channel>
</rss>
