Remove Architecture Remove CISO Remove Passwords Remove Technology
article thumbnail

CISO workshop slides

Notice Bored

For me, continuous improvement implies three things that don't exactly sing out from the example metrics: Clarity on the meaning of 'improve' in the present context, implying the need for management to understand what are the key parameters, as well as being able to measure and control/drive them in a positive direction.

CISO 63
article thumbnail

What’s It Like for a New CISO?

Lenny Zeltser

As of this writing, I’ve spent six months in the role of Chief Information Security Officer (CISO) at Axonius , a rapidly growing technology company. Our IT infrastructure is consistent zero-trust architecture principles , so it made sense to treat identity as the focal point of many security decisions.

CISO 79
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ConnectWise Quietly Patches Flaw That Helps Phishers

Krebs on Security

ConnectWise’s warnings come amid breach reports from another major provider of remote support technologies: GoTo disclosed on Nov. The third-party cloud storage service is currently shared by both GoTo and its affiliate, the password manager service LastPass. ET: Included statement from ConnectWise CISO.

Phishing 251
article thumbnail

WEF Outlines Path to Cyber Resilience for Manufacturing Sector

SecureWorld News

The risk is too great, and key business partnerships are required," said Amy Bogac , former CISO at The Clorox Company. "If Safety is always the number one priority in manufacturing organizations," said Tammy Klotz , CISO at Trinseo. It warns that by 2030, damages from cyberattacks on manufacturing could total $1.5

article thumbnail

A Question of Identity: The Evolution of Identity & Access Management

SecureWorld News

People, process & technology framework A successful IAM program requires all three dimensions—people, process, and technology—working in concert to enhance the user experience, fuel efficiency gains, and minimize enterprise risk. In this case, CISOs must manage the risks due to the technology debt.

IoT 89
article thumbnail

5 Major Cybersecurity Trends to Know for 2024

eSecurity Planet

Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. AI Use Danger As with any emerging technology, many organizations should expect errors and growing pains as teams learn the nuances of applying the technology.

article thumbnail

IoT Devices a Huge Risk to Enterprises

eSecurity Planet

It also feeds into the larger argument for adopting a zero-trust architecture , a methodology that essentially assumes that no user or devices trying to connect to the network can be trusted until they’re authenticated and verified. There also is the zero-trust architecture, according to the ThreatLabz report.

IoT 145