article thumbnail

CISO workshop slides

Notice Bored

Zero-trust - whatever that means to the presenter and audience; Cloud - meaning Azure, specifically; DevOps and DevSecOps - whatever those terms mean ; MS threat intelligence including artificial intelligence/machine learning rapid responses to novel malware (a cool idea, provided it works reliably). Thank you MS for releasing it.

CISO 63
article thumbnail

Ask These 5 AI Cybersecurity Questions for a More Secure Approach to Adversarial Machine Learning

NetSpi Executives

Artificial Intelligence (AI) and Machine Learning (ML) present limitless possibilities for enhancing business processes, but they also expand the potential for malicious actors to exploit security risks. For a comprehensive view of security in ML models, access our white paper, “ The CISO’s Guide to Securing AI/ML Models.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ConnectWise Quietly Patches Flaw That Helps Phishers

Krebs on Security

“Nevertheless, the mitigation was simple and presented no risk to partner experience, so we put it into the then-stable 22.8 ” However, LastPass maintains that its “customer passwords remain safely encrypted due to LastPass’s Zero Knowledge architecture.” ET: Included statement from ConnectWise CISO.

Phishing 251
article thumbnail

Analytics Insight Announces ‘The 10 Most Influential CISOs to Watch in 2021’

CyberSecurity Insiders

. & HYDERABAD, India–( BUSINESS WIRE )–Analytics Insight has named ‘ The 10 Most Influential CISOs to Watch in 2021 ’ in its October magazine issue. The magazine issue recognizes ten futuristic CISOs who are reimagining the business world and adopting new ways of working. He holds a Ph.D

CISO 40
article thumbnail

The Bridge to Zero Trust

CyberSecurity Insiders

John Masserini, of Tag Cyber, will explore practical approaches to advancing zero trust along with his fellow panelists: Kevin Dana, VP of Information Technology for World Wide Technology; Marcos Christodonte II, Global CISO for CDW; and Allen Jeter, Director of IT for Chainalysis.

article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. By increasing visibility into DNS traffic, CISOs can detect, block, and respond to incidents more quickly as well as use this data to institute new controls and increase overall resiliency.

DNS 140
article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

That includes the architectures, the computing platforms, the algorithms and the people and the process as well. We would build our architectures with that perimeter defense model where we’re going to have a firewall and we’re going to deny everything except for those things that we want to let through. And that’s been overcome.

CISO 109