This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Related: Technology and justice systems The U.S. Avaya Holdings , Check Point Software Technologies , and Mimecast Limited each minimized or obscured the extent of security breaches linked to the SolarWinds Orion hack, impacting investor trust and highlighting the critical importance of clear, truthful communication.
Related: A call to regulate facial recognition That said, a few dozen CISOs attending Black Hat USA 2023 will get to experience, hands-on, what it must have been like to be in the crucible of milestone hacks like Capital One, SolarWinds and Colonial Pipeline. The Data Heist’s opening night, if you will, was in Boston a couple of weeks ago.
CISOs can sometimes be their own worst enemy, especially when it comes to communicating with the board of directors. She serves on the board of several technology companies and also happens to be steeped in cyber risk governance. LW: Why do so many CISOs still not get it that FUD and doom-and-gloom don’t work?
So how will this affect chief information security officers (CISOs) and security programs? Given the perennial skills and staffing shortage in security, it’s unlikely that CISOs will be asked to make deep budget or staffing cuts, yet they may not come out of this period unscathed. Related: Attack surface management takes center stage.
To wrap up our 2024 year-end roundtable, we turn our attention to new technologies and trends that are emerging to help bridge the gaps. FIPS-203 enables legal PQC deployment, prompting CISOs to overhaul encryption strategies. We can expect security teams feeling pressure to adopt new technology quickly.
Security information and event management systems — SIEMs — have been around since 2005, but their time may have come at last. Their capacity to ingest threat feeds is becoming more relevant with the rise of IoT (Internet of Things) systems and the vulnerabilities of old and new OT (operational technology).
Attending their annual global event series, SHIFT , in London recently, he redefined the future of business resilience in his keynote address and positioned the concept of continuous business—a ground-breaking state of perpetual availability and robustness which revolves around four pivotal elements: 1.
I’m delighted to announce the latest member of our growing CISO Advisor team, Pam Lindemeon. At Anthem Pam was considered a bold and strategic thinker who envisioned and delivered a world class Enterprise Information Security strategy, including leading the Steering Committee with cross functional business and technology membership.
This approach addresses a significant pain point for CISOs and security leaders: the gap between theoretical knowledge and practical implementation of complex cybersecurity controls required by CMMC 2.0. “ Hands-on labs create immersive, real-world scenarios that transform theoretical understanding into practical readiness.
Many of Gillis’s comments echoed those that I have heard in recent months from CISOs and others within the cybersecurity industry who witness developments from various vantage points quite different from those of a vendor of cybersecurity technologies.
You've gone to events and dinners. And now, you finally got that call, to be a CISO at an organization. Before diving into security strategies, CISOs need to invest time in understanding the organization's culture, strategic roadmaps, operational dynamics, industry, and so forth. Was there a previous CISO?
Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.
It is a common feeling in the cybersecurity community that CISOs do not sleep well at night. CISOs worry about the latest incident, end of life technology in their environment, breaches in the news, insecure users and vendors, penetration testing results, budget and resources, and the latest vulnerability report (to name a few).
This affected all levels of the cybersecurity landscape, and it has had a particularly broad impact for those in the C-Suite, specifically, the Chief Information Security Officer (CISO). So, what is an already over-stressed CISO to do? Technological update. Technological integration. Clear responses to events.
I’m delighted to announce the latest member of my CISO Advisors team, Bruce Brody. He was the first executive-level CISO at the Departments of Veterans Affairs and Energy, and has had more recent success as CISO at Cubic Corporation and DRS Technologies. Eventually, I became a CISO four times over.
CISOs and their teams operate in a high-stakes environment where every misstep can result in breach headlines, financial loss, or reputational damage. And they impact more than the professionals themselves; when CISOs and their teams are stretched thin, the entire organization's security posture is at risk.
Sam Masiello , CISO, The Anschutz Corporation: "I would expect that many CISOs today are feeling as if their job just got harder and now has a brighter spotlight shining specifically on them. Many CISOs are already burnt out, and there is shortage of qualified CISOs globally. CISOs are expected to be a unicorn already.
And get the latest on exposure response strategies and on CISO compensation and job satisfaction. National Institute of Standards and Technology (NIST) released three quantum-resistant algorithm standards in 2024 and expects to release a fourth in 2026. Plus, find out how your company can create a better cybersecurity environment.
As of this writing, I’ve spent six months in the role of Chief Information Security Officer (CISO) at Axonius , a rapidly growing technology company. I’ve shared some of my lessons learned with a group of CISOs at a recent Bessemer Venture Partners event (that’s the photo at the top of this post).
Around the World with Thales: Our Upcoming Events madhav Thu, 09/28/2023 - 05:01 The summer is long gone, and we are all back to work. However, there will be plenty of opportunity for us all to catch up as the Fall season is bustling with cybersecurity events worldwide. Our event booth number is H25-C70.
With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. An integration with Cigent Technology is now available for Secure Endpoint customers to integrate with. Kenna has a healthy 3rd Party ecosystem of technology partners.
Thanks to technology, continual rapid change is here to stay. I went through some of them this week at the Cyber Security Virtual Conference: Celebrating Women in Cyber, and with PWC Canada when they engaged me to open their one day event – SheProtects: Future CISO Program. For years we’ve known it was coming, what Industry 4.0
These events span cyber breaches, regulatory non-compliance, and reputational damageoften stemming from misaligned or insufficient due diligence. With attackers exploiting supply chain vulnerabilitieslike those seen in the MOVEit and SolarWinds attacksTPRM must become cross-functional, with CISOs and security teams playing a pivotal role.
Chief Information Security Officers (CISOs) across the Global 2000 and Fortune 1000 are obsessed with protecting the workforce endpoints as critical vulnerabilities in the cybersecurity and risk management posture of their enterprises. These actions and their potential for disaster cause CISOs to greet every day with an anticipatory grimace.
Many technology workers will resign from their comfortable, high-paying jobs at larger employers. CISO shortage. CISO exodus. Chief Information Security Officers (CISOs) have a rare combination of business acumen, operational knowledge, technical insights, and legal/compliance experience.
In a world that pushes the limits with technology comes an increase in the relentless persistence of cyberattacks and we need to be prepared. Complete the short survey to tell us about yourself, the topics you’re passionate about, and which upcoming events you plan to attend. Interested in becoming a guest on Agent of Influence?
The 2025 DBIR is a call to arms for CISOs and security leaders to rethink how they detect, respond to, and recover from breaches. Vice President, Security & AI Strategy, and Field CISO at Darktrace: "While GenAI was the talk of 2024, Agentic AI will be a significant focus for organizations in the year ahead. Nicole Carignan , Sr.
John Masserini, of Tag Cyber, will explore practical approaches to advancing zero trust along with his fellow panelists: Kevin Dana, VP of Information Technology for World Wide Technology; Marcos Christodonte II, Global CISO for CDW; and Allen Jeter, Director of IT for Chainalysis.
While you might think that these actors are interested in government and defense information, their operations prove they are interested in much more – including software development and information technology, data analytics, and logistics. which supplies ultra-sensitive, portable marijuana breathalyzer technology.
These include alert prioritization, correlation of events, and even basic ticket resolution. The bigger risk is a skills gap, as security professionals must now understand both traditional threats and AI-driven technologies. "AI Gartner estimates that by 2028, more than 50% of SOC Level 1 analyst responsibilities will be handled by AI.
GFCyber is an independent, nonprofit, and non-partisan think tank that helps policymakers address societal challenges created by contemporary technology. It is a collaborative step in the direction that aims to dissect and address the cyber policy and technology issues prevailing in the modern hyper-connected world. About GFCyber.
The pre-COVID-19 CISO. The global COVID-19 pandemic has been a tumultuous time for Chief information security officers (CISOs) who on any given day have a long and complicated list of responsibilities. When employees click on the link, recipients are not immediately getting the page on their browser or in their device.
Cyber risk remains top of mind for business leaders A regular January fixture, the World Economic Forums Global Risk Report 2025 features two technology-related threats among the top five risks for the year ahead and beyond. MORE eBays CISO shares his thoughts on planning and security ROI.
It was a great event," said Paul Dial, CISO of AECOM, who was part of a closing keynote panel on "CISO: Chief in Name Only." "It It has been years since I attended a SecureWorld event. The panel was artfully moderated by Dd Budiharto, CISO, Advisory Board Member, and Founder of Cyber Point Advisory, a vCISO firm.
Furthermore, the retail sector is under high pressure during holiday seasons or events like Black Friday, Back to School, etc. To defend against this group, secure privileged accounts, implement phishing-resistant MFA, and verify every help desk identity request," said Chad Cragle , CISO at Deepwatch.
Technology oversight is a common mandate across IT and security frameworks and compliance specifications, but achieving that oversight is difficult. First, technology and operational intelligence, across the myriad of users, endpoints, applications and infrastructure, is siloed and fragmented. By Scott Gordon, CISSP, Oomnitza .
Today, most CISOs in the enterprise space have decades of experience. Here’s the reality though: even the most seasoned CISO needs help with what’s next. Here’s the reality though: even the most seasoned CISO needs help with what’s next. So, what does this mean for you as a CISO? Join us on February 23rd .
Strategic Advisor & vCISO, Sentinel Technologies; and moderator Dave Malcom , President & CEO, Malcom Risk Advisors. Many organizations are hiring virtual CISOs, which provides an executive-level cyber resource without the typical cost of hiring a CISO full time. economy.
Cisco Security was honored to be a sponsor of the 24th Black Hat USA 2021 Conference – the internationally recognized cybersecurity event series providing the security community with the latest cutting-edge research, developments and training. Read on for details…. ” -Wendy Nather. Don’t Set It and Forget It.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. Michael Gregg is the CISO for the State of North Dakota. He was voted one of the top 100 CISOs for 2023, has been invited to the White House, has testified before the U.S. A : Changing U.S.
The primary job of the Chief Information Security Officer (CISO) is to exercise continuous diligence in reducing risk, within the risk appetite and risk tolerance of the organization, so that the likelihood of a boom is low, and the corresponding magnitude of harm is limited. Some “Left of Boom” Processes. Frameworks.
And while I'm here questioning CommBank's logic, what the hell is going on with this : 1Password has an open letter to banks on precisely this because its awful advice steeped in legacy misunderstandings of both technology and human brains. We take security seriously, and use industry-leading technology to protect your accounts.
Often a combination of disruptive technologies, lagging risk behavior trends, shifts in threat actor capabilities or focus, greater expectations for cybersecurity, and new regulatory structures emerge to wreak havoc. There is a method to the madness of trying to forecast such a complex and muddled industry. In 2024: 1.
Attorney General Bonta discusses the settlement: "Technologies like the Global Privacy Control are a game changer for consumers looking to exercise their data privacy rights. But these rights are meaningless if businesses hide how they are using their customer's data and ignore requests to opt-out of its sale.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content