Remove Architecture Remove CSO Remove Risk Remove Security Awareness
article thumbnail

BrandPost: Tackling Security in the World of Containers, Hybrid Cloud, and DevSecOps

CSO Magazine

But, as traditional infrastructure evolves to a mix of bare metal, virtual, cloud, and container environments, security teams are increasingly finding it challenging to keep up with the shifting risks, compliance requirements, tools, and architectural changes introduced by new technologies.

article thumbnail

People Skills Outweigh Technical Prowess in the Best Security Leaders

SecureWorld News

But it is vital as they fight for cybersecurity budget, try to explain risk, and explain the importance of line items such as security awareness training, blue, red and purple team exercises, and more. This helps build awareness of security risks and get buy-in for security initiatives.

CISO 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to build a zero trust ecosystem

SC Magazine

Built on an identity-centric framework for security, Zero Trust completely transforms both current and legacy IT models. My experience implementing Zero Trust has shown me that, while the process to implement a complete architecture takes time, the transformation is worth the effort and the benefits will be realized throughout the journey.

CISO 134
article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Cedric Leighton is founder and president of Cedric Leighton Associates, a strategic risk and leadership management consultancy. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyber risk.

article thumbnail

Cybersecurity Culture: How Princeton University's Security Team Created It

SecureWorld News

A recent risk assessment began to expand, and we started a publicity blitz…. The IT security was being done with excellence, so we were going to leave that going while we assessed our strategy, and the operational responsibilities would come later.". One area of the diagram is Risk Management. "If

article thumbnail

ROUNDTABLE: Kaseya hack exacerbates worrisome supply-chain, ransomware exposures

The Last Watchdog

Here’s what they had to say, edited for clarity and length: Vikram Asnani, senior director – solution architecture, CyberGRX. Dom Glavach, CSO and chief strategist, CyberSN. This magnifies the risk of similar attacks targeting any industry, all sizes and even individuals, such as celebrities, CEOs, government officials, etc.