article thumbnail

Assessing Third-Party InfoSec Risk Management

Security Boulevard

Information security (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency due to the primary business risk it presents. Third-party managers need to have insights into a variety of areas of information security, including.

InfoSec 96
article thumbnail

Alyssa Miller: Charting the Course Through InfoSec and Aviation

Security Boulevard

They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect […] The post Alyssa Miller: Charting the Course Through InfoSec and Aviation appeared first on Shared Security Podcast.

InfoSec 67
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

InfoSec Leaders Share in Podcast Interview at SecureWorld Philadelphia

SecureWorld News

One of the notable sessions at the SecureWorld Philadelphia conference, April 19-20, was a podcast recording featuring three prominent Philadelphia area cybersecurity experts, in a session titled, "CISOs Riff on the Latest in Cybersecurity. Glanden serves up the specialty cocktail of the day, the "CISO."

InfoSec 97
article thumbnail

InfoSec Reviews in Project Management Workflows

Security Boulevard

I have attended numerous security conferences over the past several years, and at each one, I repeatedly hear about the importance of information security being incorporated within the planning and requirement analysis phase of the software development life cycle (SDLC). I agree – this is very important.

InfoSec 95
article thumbnail

How to Become a CISO in 5 Steps

CyberSecurity Insiders

Even if you’re just starting your cybersecurity career, you may already be thinking about the top job in the field, Chief Information Security Officer. If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. “The

CISO 112
article thumbnail

Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison

The Security Ledger

Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison appeared first on The Security Ledger with Paul F. Dustin Hutchison is CISO at Pondurance. Click the icon below to listen.

CISO 98
article thumbnail

Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson

The Security Ledger

Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson appeared first on The Security Ledger with Paul F. Dustin Hutchinson is CISO at Pondurance. Click the icon below to listen.

CISO 97