Remove CISO Remove Cyber Risk Remove Engineering
article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Unisys, for instance, was found to have framed cyber risks hypothetically even though its systems had already been breached, exfiltrating gigabytes of data. Antonio Vasconcelos , Customer Engineer, Zero Networks Vasconcelos The points raised by SEC in this investigation revealed troublesome practices.

CISO 263
article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Well see CISOs increasingly demand answers about why models flag certain malicious activity and how that activity is impactful at enterprise scale. Chearis Karsten Chearis , US Security Sales Engineer Team Lead, XM Cyber Resiliency involves four stages, while compromise has three phases: about to be compromised, compromised, and recovering.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. Amid a backdrop of increasingly sophisticated and frequent cyberattacks, APTs are a growing concern for CISOs and cyber risk owners.

article thumbnail

Annual Reports: How They Warn of Cyber Risk

SecureWorld News

On page 34 of the report, Accenture dives into the risk that cyber poses to the business. The section on cyber risk is in bold: "We face legal, reputational and financial risks from any failure to protect client and/ or Accenture data from security incidents or cyberattacks.". That's where the fine print comes in.

article thumbnail

Episode 179: CISO Eye on the Virus Guy – Assessing COVID’s Cyber Risks

The Security Ledger

In this episode of the podcast (#179), CISO Kayne McGlandry of IEEE joins us to talk about the cyber risks posed by COVID and why COVID-themed phishing emails shouldn’t be your only concern. Also: SMBs Struggle with Identity Spotlight Podcast: How DU Telecom Manages Digital Transformation Risk.

article thumbnail

Top 5 Cyber Predictions for 2024: A CISO Perspective

Security Boulevard

This past year set a profound stage, from the advent of stringent cyber regulations to the convergence of generative AI, social engineering, and ransomware. Last year, we witnessed the fast-evolving nature of social engineering attacks, and this evolution poses greater challenges for detection and defense.

CISO 104
article thumbnail

Unlock Your Cybersecurity Potential: SecureWorld PLUS Training Courses

SecureWorld News

Instructor: Kip Boyle, vCISO, Cyber Risk Opportunities LLC Have you ever wondered how to use the NIST Cybersecurity Framework (CSF) and apply it to your organization? Cyber Risk Mapping (CR-MAP) Conduct a step-by-step CR-MAP of your organization to identify vulnerabilities, create remediation plans, and minimize cyber risks.