Remove Accountability Remove CISO Remove CSO Remove Cyber Attacks
article thumbnail

CISOs Getting Back to 'Business as Usual,' Proofpoint Survey Shows

SecureWorld News

Proofpoint today released its annual report titled, "2023 Voice of the CISO: Global insights into CISO challenges, expectations and priorities," in which it surveyed 1,600 CISOs sharing their experiences over the past year and their outlook for what is to come for the cybersecurity industry. That's changing.

CISO 67
article thumbnail

Equifax Makes Security Controls Framework Available to All for Free

SecureWorld News

Equifax is sharing its Security Controls Framework to anyone who wants it as a pay-it-forward for lessons learned from its 2017 data breach in which attackers exfiltrated hundreds of millions of customer records from the credit reporting agency. "We into our security transformation. Today, we're making it available to everyone. It's dynamic.

CISO 65
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Are You Prepared for Cybersecurity in the Boardroom?

McAfee

Everyone in the company and on the board should be responsible and accountable for good cybersecurity practices. In July 2020, we saw key high-profile Twitter accounts compromised. Everyone is responsible and accountable. It is not only the CISO, CSO or CIO’s responsibility to care and do the right thing.

article thumbnail

Cybersecurity Awareness Month: Security Experts Reflect on Safety

CyberSecurity Insiders

Since last October, we have seen enterprises such as SolarWinds, Colonial Pipeline, JBS USA Holdings, Kesaya, Olympus and more become victims of large-scale cyber attacks, causing ripple effects for the companies and their customers. digital infrastructure against frequent and sophisticated attacks. Tyler Farrar ,CISO, Exabeam.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

How to Defend: Empowerment Through Cyber-Threat Intelligence Executive boards and departments face a greater frequency of cyber-attacks and an increased number of vulnerability types across enterprise operations. Place tight controls around the use of all admin rights, including the ability to grant administrative privileges.