Remove Architecture Remove Blog Remove CISO Remove Risk
article thumbnail

People Skills Outweigh Technical Prowess in the Best Security Leaders

SecureWorld News

Michael Gregg, the CISO for the State of North Dakota, speaks across the country, including keynoting at SecureWorld Detroit on Sep. A recent blog by Frank Domizio titled " The CISO Role: Beyond Technology " explores exactly what I am talking about. That's a soft skill that even the most adept CISOs are still trying to master.

CISO 106
article thumbnail

GUEST ESSAY: In pursuit of smarter cybersecurity — to overcome complex risks and grow revenue

The Last Watchdog

Smarter security to me broadly refers to relentlessly focusing on fundamentals while maturing the program, making sure your risk posture aligns with your business strategy. When it comes down to it, C-level goals and CISO initiatives are not all that misaligned. This leads to revenue gains and positive customer outcomes.

Risk 214
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Unmasking the Cracks of Today’s Cyber Defence

Jane Frankland

Instead, they’ve become complacent in their defence practices and may be exposing themselves to increased risks without even realising it. Having surveyed over 500 CISOs and ITDMs responsible for cybersecurity on the challenges faced with SOCs, their insights are not to be missed.

CISO 147
article thumbnail

Okta’s Breach Highlights Risk of Putting Crown Jewels in the Cloud

Security Boulevard

Identity credentials and source code are critical assets that can create major risks for your organization when exposed by breaches of third-party cloud service companies that provide identity management and software composition analysis. Know the risks of pushing your crown jewels into other services running in the cloud.

Risk 120
article thumbnail

ConnectWise Quietly Patches Flaw That Helps Phishers

Krebs on Security

29, roughly the same time Pyle published a blog post about his findings , ConnectWise issued an advisory warning users to be on guard against a new round email phishing attempts that mimic legitimate email alerts the company sends when it detects unusual activity on a customer account. ET: Included statement from ConnectWise CISO.

Phishing 251
article thumbnail

Ask These 5 AI Cybersecurity Questions for a More Secure Approach to Adversarial Machine Learning

NetSpi Executives

Artificial Intelligence (AI) and Machine Learning (ML) present limitless possibilities for enhancing business processes, but they also expand the potential for malicious actors to exploit security risks. For a comprehensive view of security in ML models, access our white paper, “ The CISO’s Guide to Securing AI/ML Models.”

article thumbnail

The Power of Relationships: Executive Buy-In and Security Culture for Bolstering Resilience

Cisco Security

” This is the question every CISO asks about every new program. It’s hard to imagine a more vital undertaking for CISOs. And as with all initiatives, CISOs always want to know where to begin. Experienced CISOs know that these factors can make or break security initiatives. “Where do we start?”

CISO 124