Remove CISO Remove CSO Remove Cyber threats Remove Internet
article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. For Hacking.

CSO 59
article thumbnail

Spotlight Podcast: OT Is Under Attack. Now What?

The Security Ledger

Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. appeared first on The Security Ledger with Paul F. Click the icon below to listen.

CSO 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Cyber nonprofits ask billionaire philanthropists to show them some love

SC Magazine

Craig Newmark Philanthropies has historically committed funds to cybersecurity causes and signed a letter this month calling for large philanthropic foundations and internet billionaires to consider doing the same. Photo by Jemal Countess/Getty Images). The nascent field, and society as a whole, needs their voices… and their dollars.”.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyber threat. Cloud security success and choosing the right investments is all about having a clear understanding of threat types and their resulting damages.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 2)

The Last Watchdog

Tyler Farrar , CISO, Exabeam Farrar Traditional SIEM solutions face numerous challenges with limited ability to adapt to new threats and attack vectors — and complex deployment and maintenance processes. Not surprisingly, threat actors increasingly use AI to launch attacks more efficiently and stealthily.