article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments.

CSO 52
article thumbnail

The strong link between cyber threat intelligence and digital risk protection

CSO Magazine

While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyber threat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Few Fortune 100 Firms List Security Pros in Their Executive Ranks

Krebs on Security

A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.

CSO 209
article thumbnail

Threat intelligence programs poised for growth

CSO Magazine

In my last CSO article , I detailed cybersecurity professionals’ opinions on the characteristics of a mature cyber-threat intelligence (CTI) program. Alas, most CTI programs are far from mature, but this may change over the next few years as most enterprise organizations bolster CTI program investment.

CSO 105
article thumbnail

From Compliance to Resilience: Cyber Governance as the Cornerstone of CISO Strategy

SecureWorld News

By spearheading cybersecurity programs, CISOs empower organizations to fend off cyber threats from criminal enterprises, insider risks, hackers, and other malicious entities that pose significant risks to operations, critical infrastructure, and even national security. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.

CISO 76
article thumbnail

BrandPost: Securing Operational Technology Environments for Critical Infrastructure

CSO Magazine

We’re directly addressing the communications and cybersecurity challenges exposed by the convergence of IT and OT networks alongside the ever-increasing drumbeat of cyber threats from sophisticated, state-sponsored malicious actors.

article thumbnail

Episode 250: Window Snyder of Thistle on Making IoT Security Easy

The Security Ledger

In this episode of the podcast, I speak with Window Snyder, the founder and CEO of Thistle Technologies about the (many) security challenges facing Internet of Things (IoT) devices and her idea for making things better: Thistle’s platform for secure development and deployment of IoT devices. The post Episode 250: Window Snyder of Thistle on.

IoT 98