Remove CISO Remove Data privacy Remove Encryption Remove Risk
article thumbnail

GUEST ESSAY: 5 tips for ‘de-risking’ work scenarios that require accessing personal data

The Last Watchdog

Working with personal data in today’s cyber threat landscape is inherently risky. Related: The dangers of normalizing encryption for government use. It’s possible to de-risk work scenarios involving personal data by carrying out a classic risk assessment of an organization’s internal and external infrastructure.

Risk 240
article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Last Watchdog posed two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyber risks at my organization? Cryptographic inventories need finalizing and quantum safe encryption needs to be adopted for sensitive communications and data. Their guidance: Snehal Antani , CEO, Horizon3.ai

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Resurgence of Zero Trust: Why it’s Essential for CISOs and CIOs to Include in Their Strategy

CyberSecurity Insiders

Zero trust emphasizes the importance of micro-segmentation, multi-factor authentication, encryption, and monitoring of user behavior to prevent lateral movement within the network and detect and respond to potential threats in real time. Importance for CISOs and CIOs Zero trust is no longer just a buzzword for CISOs and CIOs.

CISO 87
article thumbnail

Three Risk Mitigation Strategies to Address the Latest Data Security Threats

CyberSecurity Insiders

By Dannie Combs , Senior Vice President and CISO, Donnelley Financial Solutions (DFIN) As security threats to data continue to ebb and flow (mostly flow!), Here are three risk mitigation imperatives that can help organizations get a better handle on these latest risks and threats.

Risk 118
article thumbnail

Securing the Cloud Frontier: Navigating the Complexities of SaaS Data Protection in the Multi-Cloud Era

Thales Cloud Protection & Licensing

The complexity of managing multiple platforms exacerbates the risks, increasing operational challenges and exposing vulnerabilities to sophisticated attacker tactics. Managing Complexity and Data Sovereignty As the SaaS landscape grows, so does its complexity.

article thumbnail

7 Habits of a Highly Effective CISO: 2019 Data Security Resolutions

Thales Cloud Protection & Licensing

Unfortunately, with every possibility a new security risk appears, and as a CISO you are well-aware of the implications. So, what are some habits you can resolve to adopt this coming year to ensure you and your business are making the most of your data while keeping it secure? How Do You Select a Trusted Vendor?

CISO 72
article thumbnail

GUEST ESSAY: Leveraging best practices and an open standard to protect corporate data

The Last Watchdog

Evolving privacy regulations like the General Data Protection Regulation (GDPR) and California Consumer Privacy Act (CCPA) mean ongoing headaches for cybersecurity, compliance and risk management teams. At least 10 additional states have enacted or are considering data privacy laws. Conduct risk analysis.