article thumbnail

Protecting your Customers and Brand in 2022: Are you doing enough?

Jane Frankland

Nowadays, organisations need digital leaders such as CIOs, CISOs, and CTOs who are strategists, visionaries, and know how to manage, effectively. They know that by 2025 an estimated 70% of the workforce will be working remotely at least 5-days per week and by 2030 90% of the world’s population (7.5 billion) is expected online.

CISO 130
article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. The recent Verkada incident serves as a stark reminder, emphasizing the pressing need for CISOs to prioritize integrated IoT security and privacy in their strategic considerations.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inflation Is Making Cybersecurity Even More Challenging for Leaders

SecureWorld News

Additionally, cybercriminals may be able to use inflation to their advantage, such as by sending phishing emails that appear to be from legitimate companies offering discounts or assistance. I think it requires taking a step back and assessing what you can do with less," said Chris Roberts, CISO and Senior Director at Boom Supersonic.

article thumbnail

Cybersecurity in 2022, Predictions for digital ecosystem facing more challenges and sophisticated threats

CyberSecurity Insiders

Also, that threat actors, especially state-sponsored, and criminal enterprises would take advantage of the expanding cyber-attack surface by using their resources to employ more sophisticated means for discovering target vulnerabilities, automating phishing, and finding new deceptive paths for infiltrating malware. STRATEGIC FORCAST.

article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

Phishing attacks , still the most common form of attack ( with 9 out of 10 data breach attempts originating from them ) will become next level. Implementation will be phased with the vulnerability reporting obligations in late 2025 and the remaining obligations in early 2027.