article thumbnail

Demand, CyberInsurance, and Automation/AI Are the Future of InfoSec

Daniel Miessler

2021-2030) A Surge in Demand for InfoSec people will result in many more professionals being trained and placed within companies, likely using more of a trade/certification model than a 4-year university model. That’s the distant future of InfoSec, with humans playing less and less a part in the equation as time goes on.

InfoSec 255
article thumbnail

Iterative scientific infosec

Notice Bored

There is a strong argument to facilitate much more sharing of information about information risk and security, incidents, controls etc. So, this morning I've been thinking about the applications of those principles and mechanisms to information risk management, putting infosec under the microscope.

InfoSec 74
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 52
article thumbnail

Professional services infosec policy template

Notice Bored

Professional services engagements, and hence the associated information risks, are so diverse that it made no sense to specify particular infosec controls, except a few examples. This is another shining example of the value of the 'information ownership' concept. and that once again emphasises that corporate policies form a mesh.

InfoSec 66
article thumbnail

The Clock To Q-Day Is Ticking: InfoSec Global and Thales Provide Collaborative Path to Quantum Readiness

Thales Cloud Protection & Licensing

Vladimir Soukharev, InfoSec Global The advent of quantum computers poses a substantial threat to various industries due to their potential to compromise standard encryption methods that protect global data, communications, and transactions. This vulnerability could expose sensitive enterprise information to risk. In the U.S.,

InfoSec 71
article thumbnail

Managing Cybersecurity Risk in M&A

Cisco Security

As Technology Audit Director at Cisco, Jacob Bolotin focuses on assessing Cisco’s technology, business, and strategic risk. Bolotin champions the continued advancement of the technology audit profession and received a master’s degree in cybersecurity from the University of California Berkeley.

Risk 125
article thumbnail

CISA releases Insider Risk Mitigation Self-Assessment Tool

Security Affairs

The US CISA has released a new tool that allows to assess the level of exposure of organizations to insider threats and devise their own defense plans against such risks. The tool elaborates the answers of the organizations to a survey about their implementations of a risk program management for insider threats. Pierluigi Paganini.

Risk 92