Remove Accountability Remove CSO Remove Data breaches Remove Technology
article thumbnail

From Compliance to Resilience: Cyber Governance as the Cornerstone of CISO Strategy

SecureWorld News

They now face the risk of being implicated in criminal investigations or held accountable for security breaches, as evidenced by cases like that of Joe Sullivan, the former Chief Security Officer of Uber, who was sentenced to three years' probation for covering up a data breach involving millions of Uber user records.

CISO 76
article thumbnail

Clorox's Cybersecurity Chief Departs Amidst Incident Recovery Efforts

SecureWorld News

Conversely, if a CISO is to be held accountable in the same manner as a CFO or General Counsel concerning matters of investor confidence, the executive contours of the CISO role should be revisited to ensure that it has sufficient authority, agency, and institutional backing to defend data assets as a fiduciary."

CISO 86
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: How Configuration Assessments Help Improve Cyber Defenses

CSO Magazine

These days, information technology (IT) and information security professionals know this all too well, especially when it comes to configuration assessments. The 2020 Verizon Data Breach Investigations Report (DBIR) notes that vulnerabilities accounted for nearly 20% of hacking breaches.

article thumbnail

Uber Breach Guilty Verdict, Mandatory Password Expiration, Fake Executive Profiles on LinkedIn

Security Boulevard

Former Uber CSO Joe Sullivan was found guilty of obstructing a federal investigation in connection with the attempted cover-up of a 2016 hack at Uber, NIST and Microsoft say that mandatory password expiration is no longer needed but many organizations are still doing it, and how fake executive profiles are becoming a huge problem for […].

article thumbnail

CISO’s Guide to Presenting Cybersecurity to Board Directors

CyberSecurity Insiders

Developing a Clear Cybersecurity Strategy As a CISO/CSO, creating and presenting a clear cybersecurity strategy to the board of directors is crucial in fostering awareness of cyber risks and encouraging investment in cybersecurity defense. Vulnerability assessments highlighting areas where your organization’s defenses may be lacking.

article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

Here are the top Twitter accounts to follow for the latest commentary, research, and much-needed humor in the ever-evolving information security space. Brian Krebs is an independent investigative reporter known for his coverage of technology, malware , data breaches , and cybercrime developments. Denial-of-Suez attack.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

According to thought leaders, the compromise of video data could result in intellectual property theft, physical security threats, privacy violations, extortion and perhaps regulatory punishment. Kottmann also reportedly even posted some of the videos on Twitter, which later deleted the hacker’s account and their offending tweets.