Remove Architecture Remove CISO Remove Cybersecurity Remove Workshop
article thumbnail

CISO workshop slides

Notice Bored

Other slides in the deck appear to equate ' security posture ' to vulnerability management and software/systems patching - a rather narrow/specific technical concern for metrics suggested to senior management, although arguably it is a major factor in cybersecurity - or to security strategy.

CISO 63
article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry.

CISO 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cracking the Code to Security Resilience: Lessons from the Latest Cisco Security Outcomes Report

Cisco Security

Two years ago, we asked the question: What actually works in cybersecurity? Not what everyone’s doing—because there are plenty of cybersecurity reports out there that answer that question—but which data-backed practices lead to the outcomes we want to implement in cybersecurity strategies?

article thumbnail

AT&T Business Summit is virtual Oct. 27-28 and free!

CyberSecurity Insiders

And it’s jam-packed with cybersecurity talks! Given how critical security is to digital transformation and our ability to innovate, we’ve got a robust line-up of cybersecurity topics – from SASE to zero trust and the technologies you need to help protect your business. Join us from October 27-28, 2021 by registering.

article thumbnail

Tetrate and Federal Agency NIST Cohost ZTA and DevSecOps Conference 2022 Kicking Off With Istio and Envoy Training

CyberSecurity Insiders

SAN FRANCISCO–( BUSINESS WIRE )–Tetrate, the leading company providing a zero-trust application connectivity platform, announced their third annual conference on Zero Trust Architecture (ZTA) and DevSecOps for Cloud Native Applications in partnership with the U.S. security standards for a distributed architecture: About Tetrate.

article thumbnail

Cisco Secure Endpoint Shines in the 2020 MITRE® Engenuity ATT&CK Evaluation

Cisco Security

Cisco Secure Endpoint and MITRE ATT&CK: Why it matters to CISOs right now. As the largest cybersecurity provider on the planet, a key investment area across the broadest set of security solutions offered by Cisco is Secure Endpoint. Securing your endpoints has never been more critical and you need endpoint security you can trust.

article thumbnail

The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips

Cisco Security

On the heels of President Biden’s Executive Order on Cybersecurity (EO 14028) , the Office of Management and Budget (OMB) has released a memorandum addressing the heads of executive departments and agencies that “sets forth a Federal zero trust architecture (ZTA) strategy.” In other words, one size does not fit all.