Remove 2000 Remove Artificial Intelligence Remove InfoSec Remove Risk
article thumbnail

Weaving strategies with policies

Notice Bored

From the information risk and security perspective, virtual working is both a nightmare and, again, an opportunity. How can virtual working benefit information risk and security? What about the technology risks, not least our ever-increasing dependence on the Internet? What can be done to facilitate secure virtual working?

Risk 66
article thumbnail

CISSPs from Around The Globe: An Interview with Theresa Grafenstine

CyberSecurity Insiders

The Second line comprises the people who are looking at the risk management aspects, and I'm head of internal audit for all of technology. And we wound our way to “Year 2000” ( Y2K ), which now seems sort of silly, but in retrospect, at the time it was a big deal. To clarify, there are three lines of defense.

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

BAS offers more than just pen testing and red team insights, going further in recommending and prioritizing fixes to maximize security resources and minimize cyber risk. CyCognito is committed to exposing shadow risk and bringing advanced threats into view. Here are 11 of the top movers in the BAS market. DXC Technology.