{"id":473,"date":"2003-11-11T00:00:00","date_gmt":"2003-11-11T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/11\/security-execs-form-advisory-group\/"},"modified":"2021-12-30T11:37:25","modified_gmt":"2021-12-30T11:37:25","slug":"security-execs-form-advisory-group","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/11\/11\/security-execs-form-advisory-group\/","title":{"rendered":"Security execs form advisory group"},"content":{"rendered":"<p>Ten top security executives plan to announce a new group on Wednesday that is aimed at helping companies protect their information systems better, CNET News.com has learned.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Called the Global Council of CSOs, the group will bring together chief security officers from nine companies and one government agency.<\/p>\n<p>The Council will offer advice, publish security recommendations, work with the U.S. Department of Homeland Security and help ensure that corporate America is ready to respond to Internet attacks, according to sources who asked not to be named.<\/p>\n<p>The sole initial government representative will be Will Pelgrin, the director of cybersecurity and critical infrastructure for New York state.<\/p>\n<p>More info: [url=http:\/\/zdnet.com.com\/2100-1105_2-5105962.html ]http:\/\/zdnet.com.com\/2100-1105_2-5105962.html[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-473","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/473","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=473"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/473\/revisions"}],"predecessor-version":[{"id":2960,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/473\/revisions\/2960"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=473"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=473"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=473"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}