Remove Accountability Remove Architecture Remove CISO Remove InfoSec
article thumbnail

CISO workshop slides

Notice Bored

Security Posture suggests a confusing mix of application and account security metrics. A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 63
article thumbnail

Business Must Change: InfoSec in 2019

The Falcon's View

Consider, if you will, that fundamentally we in infosec want people to make better decisions. However, when people are empowered to make their own decisions and are held accountable for the lasting impacting , then and only then will they start adopting more of a caretaker mentality and start considering long-term impacts.

InfoSec 40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inflation Is Making Cybersecurity Even More Challenging for Leaders

SecureWorld News

I think it requires taking a step back and assessing what you can do with less," said Chris Roberts, CISO and Senior Director at Boom Supersonic. Andrew Smeaton, CISO at Afiniti, says reassessment of cybersecurity programs and plans is necessary. Too many folks focus on the technology as opposed to the people or process.

article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. Christine Bejerasco, CISO of WithSecure , expands that “in the physical dimension, poisoning the well could impact communities in the area.

article thumbnail

The Quest for Optimal Security

The Falcon's View

First and foremost, your security program must account for basic security hygiene, which creates the basis for arguing legal defensibility ; which is to say, if you're not doing the basics, then your program can be construed insufficient, exposing your organization to legal liability (a growing concern). . Behavioral InfoSec.

InfoSec 40
article thumbnail

Redesigning the Security Narrative

Duo's Security Blog

Defining “storytelling” in an InfoSec context Inspiration - We the People: Democratizing Security “Storytelling” is a word that you will hear frequently within Duo’s creative team — now part of a Brand & Strategy unit for Cisco’s rebranded security organization Cisco Secure. But where to begin?

article thumbnail

How CIOs Can Protect Data Against Ransomware Attacks in 2022

Security Boulevard

Ransomware has become one of the most dangerous and high-profile problems facing CIOs and CISOs worldwide. A Zero Trust architecture should be at the center of every security strategy. Zero Trust assumes there is no implicit trust granted to assets, user accounts, microservices, or data based solely on their location.