Remove 2019 Remove CISO Remove Cyber Risk
article thumbnail

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

The Last Watchdog

So they began inundating their third-party suppliers with “bespoke assessments” – customized cyber risk audits that were time consuming and redundant. I had the chance to visit with CyberGRX CEO Fred Kneip at RSA 2019 at San Francisco’s Moscone Center last week. For a full drill down, please listen to the accompanying podcast.

article thumbnail

Why CISOs at gaming companies need to reimagine security

SC Magazine

The hack of Words with Friends in 2019 was high-profile, but today’s columnist, Yuval Elddad of CYE, says CISOs at all gaming companies have to take a closer look at the growing threats to online gaming platforms. The last thing players want to think about when they log onto their favorite game are cyber-risks.

CISO 94
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

The RSA Conference USA 2019 held in San Francisco — which is the world’s largest cybersecurity event with more than 40,000 people and 740 speakers — is a decent measuring stick for representation of women in this field. Either way, the 20 percent figure is still way too low, and our industry needs to continue pushing for more women in cyber.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. Accel Investments.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

SAP National Security Services (NS2) CISO Ted Wagner told eSecurityPlanet that network slicing “adds complexity, which may lend itself to insecure implementation. Incentivizing a Cyber Duty of Care. There are no secure implementation guides or standards for network operators. How 5G Goes Beyond 4G.

Risk 137
article thumbnail

How to build a cyber capable board

Security Boulevard

In just a few years, cyber has transformed from the nerd in the corner into the Kim Kardashian of risk. businesses can be built on, and destroyed by, cyber risk. Ask your cyber exec to explain the threats facing the organisation. 2 Talk to your CISO. Everyone, it seems, has an opinion on the issue.

article thumbnail

NYDFS Cybersecurity Regulation: Dates, Facts and Requirements

Centraleyes

Case in Point : In 2019, First American Title Insurance Company experienced a significant data exposure incident, revealing sensitive customer documents due to a vulnerability in their document-sharing application. New Risk Assessment Standards New updates mandate independent third-party risk assessments.