Remove Architecture Remove CISO Remove Media Remove Risk
article thumbnail

Unmasking the Cracks of Today’s Cyber Defence

Jane Frankland

Instead, they’ve become complacent in their defence practices and may be exposing themselves to increased risks without even realising it. Having surveyed over 500 CISOs and ITDMs responsible for cybersecurity on the challenges faced with SOCs, their insights are not to be missed.

CISO 147
article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

“It’s about how you can do your business mission” in a different environment, with its own requirements for protecting data, Vickers said during his talk at the RSA Show’s Cloud Security Alliance CISO Summit. It’s crucial to understanding the fitness of the CSP to assess future risk. Security risk review. Technical review.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017. This is based on in-depth discussions with numerous industry experts in cybersecurity and analyzing and synthesizing third-party reports, surveys, and media sources. government clients.

article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

SC Media caught up with Touhill this week to learn how he hopes to make an impact in his new role, what issues and projects he plans to prioritize in his first year and how the old cybersecurity models we’ve relied on no longer work. He was then appointed as the first-ever U.S. chief information security officer. And that’s been overcome.

CISO 109
article thumbnail

News alert: Simbian launches with $10M to build autonomous, GenAI-powered security platform

The Last Watchdog

Its founding team comprises leading AI researchers and security veterans who have created security products in broad use across enterprises today, and have 150+ patents across large language models, cloud computing, encryption, scalable architecture, transistors, and hardware design.

CSO 100
article thumbnail

Build an insider threat management program that involves everyone

SC Magazine

Today’s columnist, Deborah Watson of Proofpoint, says with so much work conducted via virtual meetings, risk has increased and businesses have to pay more attention to an insider threat management program. Think of Insider Threat Management Programs (ITMPs) as a holistic focus on managing the risks that insiders pose to your corporate assets.

Risk 91
article thumbnail

Firms with exposed IoT have a higher concentration of other security problems

SC Magazine

SC Media spoket o Kelly White, RiskRecon founder and CEO, to find out. The data shows that smaller indicators of cybersecurity risk performance, particularly on the negative side are strong indicators of larger problems. So, how can CISOs operationalize that kind of information?

IoT 98