Remove Architecture Remove Cyber Risk Remove Education Remove Risk
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Last Watchdog posed two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? GenAI holds immense potential to supercharge productivity, but if you forget basic security hygiene, you’re opening yourself up to significant risk. Educate your workforce.

article thumbnail

What's Next for Cybersecurity in 2022?

CyberSecurity Insiders

The webinar, moderated by Brandon Dunlap, Leadership Partner, Security & Risk Management at Gartner, opens by covering the good, bad and ugly of 2021 and then moves to an engaging cybersecurity forecast for 2022. 6 – Adoption of Zero Trust Architecture Will Rise. Top Five Cybersecurity Predictions for 2022.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Her work centered on helping aerospace manufacturers manage the convergence of cyber risk across their increasingly complex business ecosystem, including IT, OT and connected products. During her first few years at Booz Allen, she supported technology, innovation and risk analysis initiatives across U.S. government clients.

article thumbnail

NIS2 Framework: Your Key To Achieving Cybersecurity Excellence

Centraleyes

Risk Assessment: Perform a comprehensive risk assessment related to network and information systems. Supply Chain Security: Assess the security of your supply chain and establish third-party risk management procedures. Notable additions include: Policies on risk analysis and information system security.

article thumbnail

Cybersecurity Landscape

Spinone

We covered the cybersecurity landscape including the most high-profile cyber crime statistics: number of attacks, crime targets, cybersecurity spendings, and cyber risk management. Cyber Risk Management It’s important to recognize that what is commonly called cybersecurity is really cyber risk managemen t.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. Cedric Leighton is founder and president of Cedric Leighton Associates, a strategic risk and leadership management consultancy. He retired as a colonel in 2010.

article thumbnail

A Guide to Key Management as a Service

Thales Cloud Protection & Licensing

By using a cloud-based KMaaS provider, organizations can centralize and automate their key lifecycle management, reducing the risk of inconsistent policies or compromised keys. Reduce business threats Key Management as a Service can help organizations reduce cyber risks and address various threats to business and data security.