Remove CISO Remove Information Security Remove Risk Remove Workshop
article thumbnail

CISO workshop slides

Notice Bored

A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning. including security-relevant aspects ( e.g. being a trusted partner). Security Response : the example metrics suggest the classical (outdated!)

CISO 63
article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry.

CISO 117
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The discomfort zone

Notice Bored

I feel more confident about the underlying generic principles of risk, compliance, conformity, obligations, accountabilities, assurance and controls though, and have the breadth of work and life experience to appreciate the next point. The mind map is a brief glimpse of the landscape, as I see it. We're definitely in the discomfort zone here.

Risk 72
article thumbnail

16 Reasons why International Women’s Day Isn’t Worth Celebrating in Cybersecurity

Jane Frankland

Women still remain significantly underrepresented According to (ISC)² Global Information Security Workforce Study (2021), women made up just 24% of the global security workforce in 2019 and in 2021. They include asking women to become more like men, to speak up more, to be more assertive, self-confident, or to take more risks.

article thumbnail

CISSPs from Around the Globe: An Interview with Jason Lau

CyberSecurity Insiders

The Certified Information Systems Security Professional (CISSP) certification is considered to be the gold standard in information security. Those doors lead to many different types of positions and opportunities, thus making the information security community dynamic and multifaceted.

article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Threat actors have dramatically escalated their attacks – targeting security controls like multi-factor authentication (MFA), conducting wily social engineering attacks and extorting businesses large and small with ransomware. To achieve more resilience in this heightened risk environment, stepping up zero trust maturity is essential.

article thumbnail

Democratizing Threat Hunting: How to Make it Happen for Everyone

Cisco Security

In the report, we surveyed more than 4,800 IT, security and privacy professionals to find out what matters most in their security practice. Topics such as tech refresh, risk management, and incident response were examined from the perspective of a roadmap for success in an information security program for organizations of all sizes.

Risk 117