Remove Architecture Remove CISO Remove Cyber Risk Remove Media
article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017. This is based on in-depth discussions with numerous industry experts in cybersecurity and analyzing and synthesizing third-party reports, surveys, and media sources. Alexandra holds a B.S.

article thumbnail

Safety first: Will insurance companies stall or accelerate cybersecurity progress?

SC Magazine

He referenced an insurer’s role in designing pressure relief valves for the steam engines powering Philadelphia in the 1800s: “They said if you wanted to have insurance, you have to have this piece of architecture on your system.” appeared first on SC Media. billion in premium.

Insurance 126
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Strong medical device security awareness stifled by inventory, knowledge gaps

SC Magazine

The CIOs and CISOs suggested that while real-time patch status may be known for certain devices, it does not exist for many.”. In health care, ransomware and data breaches frequently receive the most media attention. It allows you to understand the purpose of building a security architecture and the tasks become more manageable.”.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyber risk. Prior to joining Delta Dental, Almeida was the CISO at Covanta Holding Corporation, a leader in energy-from-waste management services.

article thumbnail

Cybersecurity Risks of 5G – And How to Control Them

eSecurity Planet

SAP National Security Services (NS2) CISO Ted Wagner told eSecurityPlanet that network slicing “adds complexity, which may lend itself to insecure implementation. To be successful, an attacker must gain access to the 5G Service Based Architecture. 5G Systems Architecture. Incentivizing a Cyber Duty of Care.

Risk 137
article thumbnail

Key Cybersecurity Trends for 2024: My Predictions

Jane Frankland

It’s where attackers work search engine rankings or paid social media content by employing deceptive techniques such as keyword stuffing, hidden text, link farms, or other unethical practices to drive traffic to their websites and gain undeserved visibility in search engine results.