This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Communication skills: All the security knowledge in the world is useless if you can’t pass on information about policies, strategies, vulnerabilities, and security posture to other system users, from upper and executive management to sales and data entry clerks. The study pegs the worldwide active cybersecurity workforce at 5.5
5, 2024, CyberNewswire — One Identity proudly announces it has been named a winner in the Hot Company: Privileged Access Management (PAM) category in the 12th annual Cyber Defense Awards by Cyber Defense Magazine (CDM), the industrys leading information security magazine. Alisa Viejo, Calif.,
In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance. As the rules were authorized in late 2023, we shared what we see as the implications for infosec leaders. This pushed C-level executives and boards to adopt measures for compliance and transparency.
CISOs and their teams operate in a high-stakes environment where every misstep can result in breach headlines, financial loss, or reputational damage. Add in long hours, under-resourced teams, and the "always-on" pressure of digital defense, and it's no wonder burnout is a looming threat within the InfoSec community.
But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. It encompasses everything from ensuring the confidentiality and integrity of information to reducing risks, maintaining compliance, and building trust with customers.
We have been identifying people based on personality and aptitude for decades," said Rick Doten , VP, Information Security, Centene Corporation, who just keynoted on the topic of neurodiversity at SecureWorld Charlotte on April 2nd. " "My initial thought is 'how is this new?' On social media, I didn't have to 'work the room.'
Gigabytes of sensitive data were exfiltrated, including customer payment card information (PCI), employee social security numbers (PII), and confidential financial documents. The CISO stared at his screen, stunned by how a single lapse could spiral into disaster. The activity appeared legitimate to monitoring systems.
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover how PlexTrac addresses these issues by integrating various data sources, providing customized risk scoring, and enhancing remediation workflows.
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. Many CISOs are already burnt out, and there is shortage of qualified CISOs globally.
Love may be in the air for all in the month of February, but for us infosec folks there are a lot of other, less desirable things also floating over the air waves (I mean networks, internet, …). While I usually write informative articles for CISOs and cybersecurity pros, there’s just something about this time ….
One of the notable sessions at the SecureWorld Philadelphia conference, April 19-20, was a podcast recording featuring three prominent Philadelphia area cybersecurity experts, in a session titled, "CISOs Riff on the Latest in Cybersecurity. Glanden serves up the specialty cocktail of the day, the "CISO."
Many of Gillis’s comments echoed those that I have heard in recent months from CISOs and others within the cybersecurity industry who witness developments from various vantage points quite different from those of a vendor of cybersecurity technologies.
Information security (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency due to the primary business risk it presents. Third-party managers need to have insights into a variety of areas of information security, including.
Even if you’re just starting your cybersecurity career, you may already be thinking about the top job in the field, Chief Information Security Officer. If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. “The
The SEC said that under First American’s remediation policies, if the person responsible for fixing the problem is unable to do so based on the timeframes listed above, that employee must have their management contact the company’s information security department to discuss their remediation plan and proposed time estimate.
I have attended numerous security conferences over the past several years, and at each one, I repeatedly hear about the importance of information security being incorporated within the planning and requirement analysis phase of the software development life cycle (SDLC). I agree – this is very important.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison appeared first on The Security Ledger with Paul F. Dustin Hutchison is CISO at Pondurance. Click the icon below to listen.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson appeared first on The Security Ledger with Paul F. Dustin Hutchinson is CISO at Pondurance. Click the icon below to listen.
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. Key findings from the report include: 90% of CISOs are concerned about stress, fatigue, or burnout affecting their team's well-being.
Kerissa Varma is Group Chief Information Security Officer of Old Mutual Limited, one of the largest financial services organizations on the African continent. The post CISO Stories Podcast: Hacking Your Way Into Cybersecurity appeared first on Security Boulevard.
Information security challenges are proving to be a huge barrier for the artificial intelligence ecosystem. Conversely, AI is causing headaches for CISOs. Here's why.
Rafal Los, host of the popular Down the Security Rabbithole Podcast, joins us to discuss CISO liability risk and the ongoing discussion in the cybersecurity community about CISOs going to jail.
Building a security awareness training program to develop a strong infosec culture requires time and money, and chief information security officers frequently try to make a case for such an investment by citing return on investment and other metrics of success. This is evidence you can take to your CISO to get the funding you need.”.
The post BSides Tampa 2021 – CISO Panel ‘John Burger, Guy Albertini, Michael Phillips, Barry Kortekas, Jon Sargent’ appeared first on Security Boulevard. Our thanks to BSides Tampa for publishing their outstanding videos on the organization's YouTube channel. Enjoy the Education!
CISO shortage. CISO exodus. Chief Information Security Officers (CISOs) have a rare combination of business acumen, operational knowledge, technical insights, and legal/compliance experience. The best ones are well-respected, hard to attract, and expensive to retain.
They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect […] The post Alyssa Miller: Charting the Course Through InfoSec and Aviation appeared first on Shared Security Podcast.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. He held information security positions in CyberArk for 11 years, and 3 […]. He held information security positions in CyberArk for 11 years, and 3 […].
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. 4 years ago he was appointed as the Chief Information Officer and Data Protection Officer at Adamed. The post Hi-5 With A CISO <br><br> Piotr Stecz, Adamed Pharma appeared first on CybeReady.
The post BSidesAugusta 2021 – Russell Eubanks’ ‘4 Keys You Must Have to Be A Successful CISO’ appeared first on Security Boulevard. Many thanks to BSidesAugusta for publishing their outstanding videos from the BSidesAugusta 2021 Conference on the organization’s YouTube channel.
The information security industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts. The post Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s Challenges appeared first on The.
Under the proposed amendment , the onus is placed upon corporate boards and executive leadership to: Implement and maintain a written cybersecurity policy—approved annually—to protect information systems and nonpublic information stored on those systems. Have Infosec certifications and passion for #cyber and #dataprivacy.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. In 2014 she founded WITSEC, a professional group of women working in IT and Information Security […]. The post Hi-5 With A CISO <br><br> Andrea Szeiler, Transcom appeared first on CybeReady.
The policies are written in the application language and give appropriate controls to developers to write their requirements into the application while the NetSec team ensures full compliance to the infosec policies dictated by the CISO organization. We’d love to hear what you think.
Even a tiny micro-business has to juggle numerous objectives simultaneously within its finite resources - a significant information risk right there. A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.
How do you increase the effectiveness of a Security Operations Center (SOC) and share this information across the organization for greater efficiency and adoption? Ricardo Lafosse, CISO at Kraft Heinz, explains - check it out. The post CISO Stories Podcast: Who is Your SOC Really For? appeared first on Security Boulevard.
Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. The post Water utility CISO offers tips to stay secure as IT and OT converge appeared first on SC Media. Asaavedra32, CC BY-SA 3.0
Bill Bowman, CISSP, CIPM, is the Chief Information Security Officer & Data Privacy Officer at financial software company Emburse. He has been a first-hired CISO at five different companies. A : When I was with Bright Horizons, many top-tier clients demanded InfoSec competence. I learned from them.
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape. Well, information security, cybersecurity happens to be a critical part of the business, being able to achieve strategic objectives.
In this episode, we discuss the SEC’s charges against SolarWinds’ CISO for misleading investors about a major cyberattack. The post SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service appeared first on Security Boulevard.
There are two primary perspectives on data sovereignty: Protect the PII (personally identifiable information) of a citizen or resident within the country in which a company operates. The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. is essential. Data protection is a team sport!
As an information security professional, I like elegant designs — all the more so because trade-off is a prerequisite for an information security manager’s success: in particular, trade-off between the level of security and its cost in the most practical, literal sense. Quality is commonly understood to come at a price.
Steve Naphy says he is very fortunate to be Chief Information Officer (CIO) for one of the largest law firms in the world, Morgan, Lewis & Bockius LLP. A : I have worked in information technology (IT) and networking for more than 20 years in the retail, distribution, and legal industries. ," that makes me feel like I have done my job.
The post BSides Tampa 2021 – Sallie Wright’s ‘The Evolving Role Of The CISO And The Security Organization’ appeared first on Security Boulevard. Our thanks to BSides Tampa for publishing their outstanding videos on the organization's YouTube channel. Enjoy the Education!
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content