Remove 2010 Remove Cyber Risk Remove Risk
article thumbnail

MY TAKE: Iran’s cyber retaliation for Soleimani assassination continues to ramp up

The Last Watchdog

When it comes to cyber warfare, America is no shrinking violet, of course. cyber ops capability is Stuxnet , the self-spreading Windows worm found insinuating itself through Iranian nuclear plants in 2010. One prime demonstration of U.S. Stuxnet was discovered only because it caused computers to shut down and reboot repeatedly.

article thumbnail

Spotlight on Cybersecurity Leaders: Imran Ahmad

SecureWorld News

I happened to "pick" cybersecurity as an area of specialization based on a conversation with my wife in 2010 while driving from Toronto to Montreal. Cyber risk is dynamic and ever changing. Get to know Imran Ahmad Q : Why did you decide to pursue cybersecurity as a career path? A : It was entirely by accident.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

MY TAKE: Identity ‘access’ and ‘governance’ tech converge to meet data protection challenges

The Last Watchdog

Not long afterwards, in about the 2010 time frame, IAM vendors first arrived on the scene, including Optimal IdM, Centrify, Okta and CyberArk, followed by many others. These vendors all spun out of the emergence of a new set of protocols, referred to as federated standards, designed to manage and map user identities across multiple systems.

article thumbnail

How to build a cyber capable board

Security Boulevard

In just a few years, cyber has transformed from the nerd in the corner into the Kim Kardashian of risk. businesses can be built on, and destroyed by, cyber risk. Ask your cyber exec to explain the threats facing the organisation. discuss how your company’s culture supports cyber security and risk management.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Cedric Leighton is founder and president of Cedric Leighton Associates, a strategic risk and leadership management consultancy. He retired as a colonel in 2010. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. She is also the host of the Mastering Cyber podcast.

article thumbnail

7 Trends I Spotted When Reviewing 2020 and the Cybersecurity Skills Gap

Jane Frankland

But according to a report by PWC, over half (56%) of the leaders they surveyed believed their organisations were at risk due to cybersecurity staff shortages. Leadership is the secret sauce for cyber risk reduction This year has called for remarkable leadership as the pandemic has taken a toll on those in the industry.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments. NightDragon.