Remove 2021 Remove InfoSec Remove Risk Remove Technology
article thumbnail

Demand, CyberInsurance, and Automation/AI Are the Future of InfoSec

Daniel Miessler

2021-2030) A Surge in Demand for InfoSec people will result in many more professionals being trained and placed within companies, likely using more of a trade/certification model than a 4-year university model. That’s the distant future of InfoSec, with humans playing less and less a part in the equation as time goes on.

InfoSec 255
article thumbnail

Resecurity Named Winner of the Coveted Global InfoSec Awards During RSA Conference 2021

CyberSecurity Insiders

Next-Gen in Third-Party Risk Management (TPRM). We knew the competition would be tough and with top judges who are leading infosec experts from around the globe, we couldn’t be more pleased,” said Gene Yoo, CEO of Resecurity. Join a webinar at [link] and realize that infosec knowledge is power. About Resecurity, Inc.

InfoSec 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Purdue University’s CERIAS 2021 Security Symposium – Randall Brooks’ ‘Cyber Supply Chain Risk Management (SCRM) And Its Impact On Information And Operational Technology’

Security Boulevard

The post Purdue University’s CERIAS 2021 Security Symposium – Randall Brooks’ ‘Cyber Supply Chain Risk Management (SCRM) And Its Impact On Information And Operational Technology’ appeared first on Security Boulevard.

article thumbnail

CISA releases Insider Risk Mitigation Self-Assessment Tool

Security Affairs

The US CISA has released a new tool that allows to assess the level of exposure of organizations to insider threats and devise their own defense plans against such risks. The tool elaborates the answers of the organizations to a survey about their implementations of a risk program management for insider threats. Pierluigi Paganini.

Risk 89
article thumbnail

Why Is Shadow IT a Growing Cybersecurity Risk?

SecureWorld News

To experiment with new technologies. Whatever the reason, shadow IT can pose a serious security risk to organizations. This means that they are more vulnerable to attack, and any data stored on them is at risk. This means that they are more vulnerable to attack, and any data stored on them is at risk. Probably not.

Risk 75
article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

For 2021, the judges took on a record number of submissions, identifying which products, people and companies stood out during a tumultuous year. Click here to see the full list of 2021 SC Award finalists. Cedric Leighton is founder and president of Cedric Leighton Associates, a strategic risk and leadership management consultancy.