article thumbnail

[eBook] Your First 90 Days as CISO — 9 Steps to Success

The Hacker News

Chief Information Security Officers (CISOs) are an essential pillar of an organization’s defense, and they must account for a lot. Especially for new CISOs, this can be a daunting task. The first 90 days for a new CISO are crucial in setting up their security team, so there is little time to waste, and much to accomplish.

CISO 95
article thumbnail

Security resilience: 4 ways to achieve company-wide buy-in

Cisco Security

Also, “Accidental CISO” (AC), Chief Information Security Officer , who was just trying to get SOC2 and ISAC certifications for a vendor when he was abruptly named CISO of his organization. And finally, Christos Syngelakis, CISO, and Data Privacy Officer at Motor Oil Group.

CISO 92
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passkeys and The Beginning of Stronger Authentication

Thales Cloud Protection & Licensing

Passkeys and The Beginning of Stronger Authentication madhav Fri, 02/02/2024 - 05:23 How passkeys are rewriting the current threat landscape Lillian, an experienced CISO, surveyed the threat landscape. Google's password manager or Apple's iCloud) and from there propagate to any other device the user may have linked to the same cloud account.

article thumbnail

Protecting Against Ransomware 3.0 and Building Resilience

Duo's Security Blog

We were able to implement strong security controls without disrupting the business of helping patients, and Duo has helped us to do it easily and securely,” said John Zuziak, CISO of the University of Louisville Hospital (UofL) where over 500,000 patients are served every year. In the last. It was an easy choice for us.

article thumbnail

Passkeys and The Beginning of Stronger Authentication

Security Boulevard

Passkeys and The Beginning of Stronger Authentication madhav Fri, 02/02/2024 - 05:23 How passkeys are rewriting the current threat landscape Lillian, an experienced CISO, surveyed the threat landscape. Google's password manager or Apple's iCloud) and from there propagate to any other device the user may have linked to the same cloud account.

article thumbnail

Five Lessons from the JBS Attack for Securing the Manufacturing Supply Chain

Security Boulevard

And what steps should CISOs in the manufacturing industry be taking to secure their rapidly evolving supply chain? Mitigating the risks associated with the rapidly changing manufacturing supply chain must be prioritized by CISOs and form part of a comprehensive “ identity-first security ” strategy.

article thumbnail

To Achieve Zero Trust Security, Trust The Human Element

Thales Cloud Protection & Licensing

The system needs to also take into account user trends and shifting requirements, rather than looking solely at least privilege access. Over the last few years, cybersecurity innovators have been introducing various platforms that support this, and CISOs are starting to aggressively plan for and adopt them. Encryption Key Management.