This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy. 6 - State CISOs on the frontlines of AI security As the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies. national security.
Mentioning the phrase “shadow IT” to CISOs often results in an eye-roll or a grimace. Learn the 5 key qualities of successful CISOs, and how to develop them and 7 security incidents that cost CISOs their jobs. Sign up for CSO newsletters. ]. | Sign up for CSO newsletters. ].
KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Nobody’s saying these companies don’t have CISOs and/or CSOs and CTOs in their employ.
Corporate boards are asking their CISOs to inform them more often about cybersecurity risks. Here are some common mistakes that CISOs make when speaking to the board, along with advice for avoiding them. To read this article in full, please click here
CISOs will have to manage new security challenges in a post-pandemic world. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].
Several years ago, we invited board members to speak candidly about presentations from company executives. The panel members’ engaging insights remain instructive to CISO s today as security leaders strive to hone their increasingly important board presentation approaches.
Asset disposal normally isn’t one of those burning topics that is top-of-mind for CISOs, yet every CISO must be able to address it when asked to describe their information technology asset disposal (ITAD) program. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].
Joe Sullivan, the former Chief Security Officer (CSO) of Uber, has been sentenced to three years’ imprisonment and 200 hours of community service for covering up a cyber attack on the company’s servers in 2016, which led to a data breach affecting over 50 million riders and drivers.
Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. To ensure cybersecurity becomes a strategic part of the corporate culture, it is crucial for CISOs to present the topic in a clear, concise, and compelling manner.
It doesn’t communicate enough to other executives,” says Marinkovic, who provides virtual CISO services through Tiro Security and serves on the Emerging Trends Working Group with the IT governance association ISACA. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
The manner in which companies do business in China saw a monumental change take effect on November 1 when China’s new Personal Information Protection Law (PIPL) took effect. First announced in August 2021, it was clear entities with a China footprint were faced with the dilemma: Comply or face the consequences.
CISOs know them, too. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. Becoming a CISO is not something you’re going to be able to do right away. It is not possible to get a CISO status unless you have extensive field experience.
The CEO’s email landed in Maurice Stebila’s inbox around midnight, the message asking whether Stebila, the company’s CISO at the time, had heard about the latest news-making cyber event. “He Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
But a closer inspection of the facts is critical, and should temper sky-is-falling concerns that personal liability of CISOs is the new norm. RELATED: Data Breach Cover-Up: Uber's Former CSO Faces up to 8 Years Behind Bars ]. Sullivan's conviction should not be an existential crisis for CISOs and security professionals.
And now, you finally got that call, to be a CISO at an organization. Before diving into security strategies, CISOs need to invest time in understanding the organization's culture, strategic roadmaps, operational dynamics, industry, and so forth. Was there a previous CISO? You ' ve worked in the trenches.
Department of Justice just filed federal charges against Uber's former Chief Security Offier (CSO) for allegedly covering up a company data breach and bribing hackers to stay silent about the attack. What is Uber's former CISO accused of doing? Here is more on the charges against the former Uber CSO.
CISOs know they must respond quickly and effectively to an incident, yet surveys point to continuing challenges to deliver on that goal. Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board. Sign up for CSO newsletters. ].
AI and machine learning (ML) capabilities present a huge opportunity for digital transformation but open yet another threat surface that CISOs and risk professionals will have to keep tabs on. This is where AI red teaming comes into play. To read this article in full, please click here
Buried deep in IT, he got the sense that “people didn’t want to talk to us.” [ Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board. Sign up for CSO newsletters. ]. But over the years security moved out from under network operations and into a dedicated CISO office.
Equifax CISO Jamil Farshchi has pulled back the curtains on cybersecurity operations, saying that he believes “transparency to all stakeholders to the deepest degree reasonable” makes for a more secure company. “If Sign up for CSO newsletters. ]. If we have transparency, it makes sure we’re up to snuff in every facet of our program.
Wilson was opening keynote speaker at the recent CSO UK Security Summit where she reflected upon the biggest changes in the risk and security landscape and how CISOs must respond to lead teams and embrace emerging opportunities. What follows are highlights from that presentation. To read this article in full, please click here
Florida State University CISO Bill Hunkapiller wouldn’t let Covid derail his plans to improve the university’s resiliency capabilities. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].
Jerich Beason, CISO, Commercial Bank at Capital One, equates the Great Resignation with the great onboarding. “If You only have one chance to make a first impression.” [ Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board. Sign up for CSO newsletters. ].
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
Leighton will present a deep dive on this topic during the SecureWorld Midwest virtual conference on November 3, 2022. Interestingly enough, Leighton points out that Russian President Vladimir Putin idolizes Peter the Great, who conquered a lot of territory, including much of which is present day Ukraine.
For the first time, over a dozen cybersecurity companies have come together to produce an agnostic study titled LATAM CISO Report 2023: Insights from Industry Leaders. The 2023 LATAM CISO Report offers different cybersecurity perspectives of industry leaders in Latin America. Duke University conducted the survey.
In this session led by Cisco Secure CISO Josh Yavor, you’ll learn about best practices that Cisco implemented to enable secure access for a global remote workforce, providing the best experience for productivity without compromising on security.
Regardless of intent, nation state adversaries pose clear and present danger to business continuity. Such an alert backs the office of the CISO when presenting security priorities to the board and other senior executives.". A cybersecurity team needs to double down on their environment.
I had a lovely chat with one of my favorite CISOs the other day, helping them think through the security metrics that they report upwards. Front and center, as I see in almost every security metrics presentation, was a pair of my least favorite monthly measurements: average age of open vulnerabilities, and total open vulnerabilities.
Dr. Fred Kwong is VP and CISO at DeVry University and is based in Chicago, IL. Fred serves on the Advisory Council for SecureWorld Chicago and will be presenting at our upcoming conference on June 6, 2024. Fred will be presenting a session entitled Deepfakes: The New Frontier in Cybersecurity or Just Hype?
Cryptocurrency and NFTs are on many organizations' agenda as they discuss the ramifications of Web3 and the opportunities it presents. At the same time, the market for non-fungible tokens (NFTs) skyrockets, with new artists becoming millionaires and more established names like Snoop Dogg, Martha Stewart and Grimes capitalizing on the trend.
Policies are becoming more diverse, complex, expensive, and harder to qualify for, presentingCISOs and their organizations with new challenges and considerations for optimal cyber insurance investment. To read this article in full, please click here
I've presented at SecureWorld now six times, in addition to other regional and national events." I was fortunate enough to have connected with the previous CISO at the org, and he recruited me into the role. I got to meet him at Black Hat this year, and his presentation with Jake Williams was so spot on and insightful.
This presents a challenge to security leaders. As security engineering teams continue to grow in prominence, CISOs need to be intentional with their structure and development. To read this article in full, please click here
It was apropos that Ray Yepes, newly appointed CISO for the State of Colorado, opened the 2022 SecureWorld Denver conference on October 6th. Ray Yepes, CISO for the State of Colorado, presents the opening keynote. Takeaways and quotes from the day's presentations. But you got to know you're doing it for the right thing.
Plus, a PwC study says increased collaboration between CISOs and fellow CxOs boosts cyber resilience. 1 - Tenable: Riskiest cloud workloads present in 38% of orgs Almost 40% of global organizations have cloud workloads that put them at the highest risk of attack — an alarmingly high percentage.
He is active in CIO Roundtables, CISO Chicago, the Chicago Life Sciences Consortium, and the Technology Leaders' Association. Fun fact: my six years as CSO of Trexin is my first official full-time security role! If you're interested in presenting at a SecureWorld conference, please fill out our speaker submission form.
This means CISOs need to think about security transformation, and as they do, every process and layer of the security technology stack is in play. But when I’m not presenting with Candy, I’ll be learning everything I can about security operations center (SOC) modernization. To read this article in full, please click here
We now have a much broader set of users who are utilizing our product in a myriad of unexpected ways, presenting us with challenges we did not anticipate when the platform was conceived.". These quick actions earned praise from many CISOs around the world, who got what he was saying and were impressed with what he was doing.
A fully autonomous security platform presents a big opportunity in the global cybersecurity market which, according to a cybersecurity market report , is to grow to $298.5 Simbian helps every member of the security team from the CISO to the frontline practitioner solve their unique security needs in real-time. billion by 2028.
They presented this summary of those exploits — the thumbs up means those capabilities have been enhanced in GPT-4: ChatGPT security issues carried over to GPT-4. Here’s a look at some of those issues — including some that came up at this week’s RSA Conference in San Francisco.
The “people problem” is a phrase I heard in many different occasions when I met with IT managers (CISO, CSO, CIOs), many in leading research labs, national security establishments, and such. I presented it at Blackhat in 2016 and 2017. The worst is yet to come and 2021 might, unfortunately, see even bigger attacks realized.
Since hiring its current CISO Jamil Farshchi , however, the firm has placed a stronger emphasis on fortifying its own internal security hygiene. To avoid playing the blame game, Winick recommended that breached companies seek the advice of external consultants who can look at the situation with no bias.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content