article thumbnail

How to build a cyber capable board

Security Boulevard

In just a few years, cyber has transformed from the nerd in the corner into the Kim Kardashian of risk. businesses can be built on, and destroyed by, cyber risk. Ask your cyber exec to explain the threats facing the organisation. Your HR, IT and security teams should work together on this?

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

He retired as a colonel in 2010. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyber risk. She is also the host of the Mastering Cyber podcast.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Identity ‘access’ and ‘governance’ tech converge to meet data protection challenges

The Last Watchdog

Not long afterwards, in about the 2010 time frame, IAM vendors first arrived on the scene, including Optimal IdM, Centrify, Okta and CyberArk, followed by many others. These vendors all spun out of the emergence of a new set of protocols, referred to as federated standards, designed to manage and map user identities across multiple systems.

article thumbnail

IRISSCON 2023: OT, AI, and human empathy

BH Consulting

Stuxnet in 2010 was the first the most recent was CosmicEnergy in 2023. This allows police to learn more about current cyber risks, he explained: “intelligence is the bedrock of policing”. One way to do this is by getting to know how the board likes to be presented with information.