Remove Architecture Remove CISO Remove CSO Remove Phishing
article thumbnail

How to build a zero trust ecosystem

SC Magazine

With its tailored controls, micro-perimeters and trust-nothing approach to access, Zero Trust gives CISOs confidence that their security program can secure their remote workforce and meet regulatory compliance requirements. James Carder, LogRhythm CSO. What is Zero Trust?

CISO 134
article thumbnail

Cybersecurity Culture: How Princeton University's Security Team Created It

SecureWorld News

Sherry brought to Princeton his 25 years of technology experience, 12 of which was in higher education as the former CISO at Brown University. Sherry explained that he (the CISO) would have no operational responsibilities in the beginning to focus solely on the execution of the mission.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures

The Last Watchdog

Here’s what they had to say, edited for clarity and length: Vikram Asnani, senior director – solution architecture, CyberGRX. Dom Glavach, CSO and chief strategist, CyberSN. Chris Clements, VP of solutions architecture, Cerberus Sentinel. Gary Phipps, VP of solution architecture, CyberGRX.

article thumbnail

Theme of Cooperation Resounds at 10th Annual Denver Conference

SecureWorld News

It was apropos that Ray Yepes, newly appointed CISO for the State of Colorado, opened the 2022 SecureWorld Denver conference on October 6th. Ray Yepes, CISO for the State of Colorado, presents the opening keynote. Down the hall, Brenden Smith, CISO at FirstBank, presented "Revisiting Deception Systems: Enterprise Use Cases."

CISO 71