article thumbnail

Exposure Management Works When the CIO and CSO Are in Sync

Security Boulevard

In this post, Tenable CIO Patricia Grant looks at how the CIO/CSO relationship is key to a successful exposure management program. When I first joined Tenable, one of the first things I did was sit down with our CSO, Robert Huber , to align on how we were going to work together. So, my advice to fellow CIOs: Stay close to your CSO.

CSO 52
article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Stuart McClure, CEO, Qwiet AI McClure The SEC’s goal appears to be to hold these companies accountable to investors for any successful cyberattacks and expose the company’s lack of preparation and prevention. Daniel Lakier , Field CSO, Myriad360 Lakier Cyber professionals represent the companies they work for and are meant to protect them.

CISO 263
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CSO's ultimate guide to security and privacy laws, regulations, and compliance

CSO Magazine

CSO's ultimate guide to security and privacy laws, regulations, and compliance Security and privacy laws, regulations, and compliance: The complete guide This directory includes laws, regulations and industry guidelines with significant security and privacy impact and requirements. Health Insurance Portability and Accountability Act (HIPAA).

CSO 128
article thumbnail

Uber CSO Found Guilty: The Sky Is Not Falling. Yet

SecureWorld News

RELATED: Data Breach Cover-Up: Uber's Former CSO Faces up to 8 Years Behind Bars ]. This type of initiative could have a far wider impact on CISO and security professional accountability than any one criminal prosecution, and should be watched by organizations and security professionals alike.

CSO 98
article thumbnail

Report: Active Directory Certificate Services a big security blindspot on enterprise networks

CSO Magazine

Its public key infrastructure (PKI) component, however, has not received the same level of scrutiny and, according to a team of researchers, deployments are rife with serious configuration mistakes that can lead to account and domain-level privilege escalation and compromise. To read this article in full, please click here

CSO 133
article thumbnail

GAO report faults CIOs, OMB for slow adoption of cybersecurity recommendations

CSO Magazine

The US General Accountability Office (GAO) issued the 19-page report , “Cybersecurity and Information Technology: Federal Agencies need to Strengthen Efforts to Address High-Risk Areas” on July 29. Sign up for CSO newsletters. ]. Both pointed out shortcomings in the cyber readiness of the United States government.

CSO 142
article thumbnail

4 steps to protect the C-suite from business email compromise attacks

CSO Magazine

The damage from executive email account takeovers can run into millions of dollars, as recent examples show. The recent SolarWinds attack was bad enough, and now Nobelium, the group responsible, has since launched a campaign of email attacks appearing to originate from USAID after its Constant Contact email account was compromised.

CSO 131