article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Last Watchdog posed two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? In 2024 I encourage leadership to dedicate more attention to discussing the risks of spear phishing. Young employees eager to prove their metal are particularly at risk.

article thumbnail

What's Next for Cybersecurity in 2022?

CyberSecurity Insiders

6 – Adoption of Zero Trust Architecture Will Rise. 7 – Boards Will Play More Active Role in Quantifying and Monitoring Cyber Risk. Top Five Cybersecurity Predictions for 2022. 1 – The Overall Volume of Successful Attacks Will Decline. 2 – IT Budgets Will Rebound (Slightly). 4 – Cloud-based Security Solutions Continue to Rise.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Her work centered on helping aerospace manufacturers manage the convergence of cyber risk across their increasingly complex business ecosystem, including IT, OT and connected products. Director, Industry Solutions Americas Solutions Architecture & Customer Success. Director of Cyber Risk & Security Services.

article thumbnail

NIS2 Framework: Your Key To Achieving Cybersecurity Excellence

Centraleyes

Conduct assessments to improve visibility into control effectiveness and cyber maturity levels within your organization. Identify areas with insufficient visibility and potential cyber risks. Evaluate control effectiveness and cyber maturity levels. Ensure timely reporting and response to identified risks.

article thumbnail

Cybersecurity Landscape

Spinone

We covered the cybersecurity landscape including the most high-profile cyber crime statistics: number of attacks, crime targets, cybersecurity spendings, and cyber risk management. Cyber Risk Management It’s important to recognize that what is commonly called cybersecurity is really cyber risk managemen t.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Click here to see the full list of 2021 SC Award finalists.

article thumbnail

A Guide to Key Management as a Service

Thales Cloud Protection & Licensing

Reduce business threats Key Management as a Service can help organizations reduce cyber risks and address various threats to business and data security. Encryption: Encryption is an important part of KMaaS architecture. Overall, the KMaaS architecture allows the platform to be highly scalable, secure, and simple to use.