Remove CISO Remove Cloud Migration Remove Risk Remove Technology
article thumbnail

Five considerations for cloud migration, from the House of Representatives CISO

SC Magazine

A visitor photographs a symbol of a cloud at the Deutsche Telekom stand the day before the CeBIT technology trade fair. It’s about how you can do your business mission” in a different environment, with its own requirements for protecting data, Vickers said during his talk at the RSA Show’s Cloud Security Alliance CISO Summit.

article thumbnail

Grandson of FISMA: Why We Desperately Need New Cybsersecurity Legislation from the 117th Congress

Cisco Security

On August 3, 2021, the Senate Homeland Security and Governmental Affairs (HSGAC) released a report entitled “Federal Cybersecurity: America’s Data Still at Risk.”. The modern CISO is more than “IT security.” The Risk Management Framework doesn’t take into account that the human is the new perimeter of the enterprise.

CISO 115
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017. Her work centered on helping aerospace manufacturers manage the convergence of cyber risk across their increasingly complex business ecosystem, including IT, OT and connected products.

article thumbnail

5 Cyber Trends to Expect in 2024

NetSpi Executives

From the emergence of the MOVEit vulnerability to the wide adoption of ChatGPT and its associated security risks, nearly every industry was impacted by cyber threats. The best security program requires a combination of purpose-built, automated technology and human intuition and intelligence.

article thumbnail

RSAC insights: Security platforms arise to help companies discover, assess and mitigate cyber risks

The Last Watchdog

Pity the poor CISO at any enterprise you care to name. As their organizations migrate deeper into an intensively interconnected digital ecosystem, CISOs must deal with cyber attacks raining down on all fronts. CISOs need only to follow the principles honed over the past 200 years by the property and casualty insurance industry.

article thumbnail

The State of Cloud and Cloud Security in 2020

SecureWorld News

Not everyone would describe cloud security as "very exciting," however, the four expert panelists who joined us on our series of SecureWorld Remote Sessions for a Q&A hour all certainly shared this sentiment. The panelists spoke on cloud migration, the state of the cloud during the pandemic, the DevOps pipeline, and more.

article thumbnail

Black Hat insights: How Sonrai Security uses graph analytics to visualize, mitigate cloud exposures

The Last Watchdog

With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security. The one arena that’s a perfect fit for graph analytics – but where it has not yet been extensively leveraged – is in cloud security. Visualizing dependencies.

Risk 214