Remove CISO Remove CSO Remove Data privacy Remove Technology
article thumbnail

Wells Notice Against SolarWinds CISO Could Be First of Its Kind

SecureWorld News

In a LinkedIn post today, June 26th, Jamil Farshchi, EVP and CISO at Equifax, had this to say about the news: "This is a really big deal. It's unprecedented: this is likely the first time a CISO has ever received one of these. So it seems odd for a CISO to get one of these," he wrote. federal securities laws."

CISO 88
article thumbnail

Why the modern CISO should plan for greater Cybersecurity Regulations in the Biden Era

SC Magazine

We are unsure what the rest of 2021 has in store, but the most successful CISOs will be the ones ensuring security teams have access to the latest intel and tools to be prepared for emerging threats. Achieve Compliance and Data Privacy Regulation Standardization at the Federal Level. James Carder, CSO, LogRhythm.

CISO 96
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

BrandPost: Safe at Any Speed: Formalizing Consumer Privacy Risk Management

CSO Magazine

As regulators and legislators consider new approaches to addressing consumer privacy, CISO s and colleagues in technology and consumer products companies that use personal data should reconsider how they’re balancing their management of data privacy risks and the need for speed.

Risk 74
article thumbnail

Importance of Cybersecurity Profession Highlights SecureWorld Chicago

SecureWorld News

And so we think about different types of cybersecurity risk and how those risks or vulnerabilities or threat actors can actually impede that ability or an organization to meet those objectives," said Mary Faulkner, CISO at Thrivent, one of four panelists that took the stage to kick off the conference.

article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

According to thought leaders, the compromise of video data could result in intellectual property theft, physical security threats, privacy violations, extortion and perhaps regulatory punishment. All sensitive data should only be stored for the amount of time required and in accordance with any data privacy policies,” said Smith.