Remove CISO Remove Firewall Remove Presentation Remove Risk
article thumbnail

Today’s CISO Insights – How to Tackle the Quantum Threat

CyberSecurity Insiders

This is why CISOs everywhere should be concerned. CISOs should begin to familiarize themselves with these and evaluate their potential suitability for adoption. Once that ecosystem is understood and its supporting cryptology has been identified, CISOs should develop a plan that considers quantum-resistant technology.

CISO 133
article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. While it fosters innovation, automation, and productivity, it simultaneously introduces significant cybersecurity and privacy risks.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight on Cybersecurity Leaders: Arun DeSouza

SecureWorld News

He has been a CISO for 20 years and has extensive global IT and security leadership and transformation experience. He loves strategic planning, risk management, Zero Trust, Software Defined Perimeter, and Self-Sovereign Identity. It can be used to drive innovation but yet poses risks to intellectual property and security.

article thumbnail

A Reactive Cybersecurity Strategy Is No Strategy at All

CyberSecurity Insiders

A foundational approach to cybersecurity empowers CISOs to see abnormalities and block threats before they do damage. These developments have made the perimeter so porous that the old approach of simply hiding behind a firewall and keeping the rest of the world at bay is no longer feasible. by David Ratner, CEO, HYAS ( www.hyas.com ).

DNS 140
article thumbnail

Predictions for 2023 API Security

CyberSecurity Insiders

Prediction #2: Leaders will see APIs as representing both security and business risks. That’s because the lack of control, security, and governance around APIs doesn’t just increase risks, it is also operationally inefficient. Prediction #4: Organizations will right-size data storage to reduce risks.

CISO 118
article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

But ultimately, what we’re trying to do is to reduce the risks to national security and national prosperity by hardening and strengthening that cyber ecosystem. That model has been overcome by things like [smartphones] and mobility and the firewalls are very difficult to configure and maintain. And that’s been overcome.

CISO 109
article thumbnail

MITRE ResilienCyCon: You Will Be Breached So Be Ready

eSecurity Planet

The conference’s focus on cyber resilience doesn’t mean that organizations should abandon core security defenses like EDR , access control and firewalls , but they should be prepared for the advanced threats that will, at some point, get past them. Also read : Is the Answer to Vulnerabilities Patch Management as a Service?

Backups 115