Remove CISO Remove CSO Remove Cyber threats Remove Education
article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. For Hacking.

CSO 59
article thumbnail

Putting the Brakes on Targeted Attacks Against Transit Agencies

CyberSecurity Insiders

By Konrad Fellmann, CISO and VP of IT infrastructure, Cubic Corporation. Plus, a recent report by the Mineta Transportation Institute doubled down on the need for C-level security and technical expertise—for instance, hiring a chief security officer (CSO) or chief information security officer (CISO).

CISO 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber nonprofits ask billionaire philanthropists to show them some love

SC Magazine

Judge has faced the same problem, finding that many philanthropic organizations don’t think cyber aligns with their areas of interest, be it economic development and disparity, education or mental health. These includes finance, education and social media giants. Social media… is one of the largest threat vectors,” said Judge.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyber threat. Cloud security success and choosing the right investments is all about having a clear understanding of threat types and their resulting damages.

article thumbnail

Cybersecurity Awareness Month: Security Experts Reflect on Safety

CyberSecurity Insiders

At the end of the day, lack of education and human error are two of the largest contributors to data breaches. Cyber attacks nowadays do not often come from ingenious ‘hackers’ in dark rooms, they’re often the result of an employee reusing the same password, or businesses not implementing basic practices such as multi-factor authentication.