This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance. As the rules were authorized in late 2023, we shared what we see as the implications for infosec leaders. Exposure management can help meet the SEC requirements So what can a CISO do about this?
Artificial intelligence (AI) is no longer an emerging trendit's a present-day disruptor. Our future advantage lies in how well we integrate human judgment with machine speed," said Sanjay Sharma , CISO, Zafin. The real risk isn't AI taking jobsit's falling behind while others use it to move faster, smarter, and more secure."
I have a CISO peer who calls himself a 'compulsive interviewer' where he finds himself talking to wait staff, bartenders, retail workers, hospitality workers, those who show unique problem solving skillsworking under pressure or applying pattern matching to anticipate a problem and fixing it before it appears.
Many of Gillis’s comments echoed those that I have heard in recent months from CISOs and others within the cybersecurity industry who witness developments from various vantage points quite different from those of a vendor of cybersecurity technologies. Sampling No Longer Works.
Information security (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency due to the primary business risk it presents. The post Assessing Third-Party InfoSec Risk Management appeared first on Security Boulevard.
If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. Becoming a CISO is not something you’re going to be able to do right away. It is not possible to get a CISO status unless you have extensive field experience.
So let’s get together from Monday, May 17 to Thursday, May 20 to catch up with our peers, dive into the latest trends and solutions, and learn best practices for dealing with present and future challenges. Ask three infosec pros and you’ll get three different answers. What makes a successful security program?
We've come across a lot of cybersecurity memes here at SecureWorld, and a few always seem to pop up during presentations at our regional cybersecurity conferences. Here are some of the most amusing ones InfoSec memes we've seen. Top 10 cybersecurity memes.
Zero-trust - whatever that means to the presenter and audience; Cloud - meaning Azure, specifically; DevOps and DevSecOps - whatever those terms mean ; MS threat intelligence including artificial intelligence/machine learning rapid responses to novel malware (a cool idea, provided it works reliably). Thank you MS for releasing it.
Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel.
Leighton will present a deep dive on this topic during the SecureWorld Midwest virtual conference on November 3, 2022. Interestingly enough, Leighton points out that Russian President Vladimir Putin idolizes Peter the Great, who conquered a lot of territory, including much of which is present day Ukraine.
So, I proudly present, my top 5 read blogs during the course of 2020. 2: Why Predator is the ultimate CISO movie I really enjoyed writing this – and was surprised at how much love and attention this got. It’s one big inside joke that you’ll only appreciate if you’ve worked in infosec.
He has been a first-hired CISO at five different companies. A : When I was with Bright Horizons, many top-tier clients demanded InfoSec competence. A : I started 16 quarters ago when the company needed its first CISO. Bill will be presenting "Moving from CISO to CRO: A Journey into Risk. I learned from them.
The Cyentia Institute conducted an independent analysis of the survey data on behalf of Cisco Secure and generated all results presented in this study. We surveyed over 4,800 active IT, security, and privacy professionals from 25 countries. What is the strongest correlation of them all?
My goals in InfoSec are similar: to teach the organization how to protect itself. A : Word of mouth and an opportunity to be involved from the ground up in establishing an InfoSec team at a law firm. A : Reconnecting with the Philadelphia InfoSec community. ," that makes me feel like I have done my job.
The City of Brotherly Love showed out and attended our four keynotes, 25 breakout and panel sessions, three chapter meetings, and two PLUS courses, learning from more than 64 volunteer presenters! It wasn't] a company decision to go get them," said Smeaton, the CISO at DataRobot.
Have you ever attended a webcast and were saddened when it's over because the presenters really made you think? That was the case for a broadcast SecureWorld recently hosted with Mike Britton, CISO of Abnormal Security , and legendary investigative journalist Brian Krebs.
I think it requires taking a step back and assessing what you can do with less," said Chris Roberts, CISO and Senior Director at Boom Supersonic. Andrew Smeaton, CISO at Afiniti, says reassessment of cybersecurity programs and plans is necessary. Too many folks focus on the technology as opposed to the people or process.
The virtual conference is free to attend and will span three days including multiple tracks: Frameworks, Security, & Risk, Transforming the C-Suite, and InfoSec 360. Each day will feature a keynote presentation from CyberSaint and industry thought leaders along with multiple breakout sessions. InfoSec 360.
Bryan Bechard is CISO for Flagship Credit Acceptance. He has been working in cybersecurity for the last 20 years and teaching the next generation of InfoSec pros. Bryan will present a session on " Taking a Proactive Approach to a Theoretical Incident. " See the conference agenda and register here.
Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel.
This fluid dynamic presents a particularly complex challenge for enterprise security teams that will need to be addressed with a combination of legacy and innovative methods. CISOs and infosec professionals are finally getting a seat at the table at an executive and board level. Let’s keep the conversation going.
Randy is a CISSP and is active in the Central Missouri InfoSec community. To hear more from Randy Raw, attend SecureWorld Kansas City next week, where he will be participating in the closing keynote, "CISO Panel: The Future of Work." Get to know Randy Raw. See the conference agenda and register here.
One thing they both stressed during the presentation was how important reporting is for organizations that experience a cyber incident. Paul Rapier, Vice President of Information Technology for the Detroit Pistons, led a discussion on best practices for InfoSec teams.
Similarly, a quarter of CISOs said that their job has affected their mental and/or physical health, as noted by Cyberscoop. Here are some more insights from people in the infosec community on what works for them: Advice on How Security Pros Can Promote Their Mental Health. Helen Patton | Advisory CISO at Cisco. Just be there.
Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel. Permalink The post Cyber Week 2023 & The Israel National Cyber Directorate Presents – FraudCON (Virtual) appeared first on Security Boulevard.
Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel.
Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel.
Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel.
"Preparing for a Post-Quantum World" is the topic of a panel presentation at SecureWorld Denver on September 19, and with good reason. As for the panel presentation at SecureWorld Denver , it features Edgar Acosta, Experienced Cybersecurity Professional (former CISO at DCP Midstream ); Craig Hurter, Sr.
Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel.
We now have a much broader set of users who are utilizing our product in a myriad of unexpected ways, presenting us with challenges we did not anticipate when the platform was conceived.". These quick actions earned praise from many CISOs around the world, who got what he was saying and were impressed with what he was doing.
Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel.
Many thanks to Israel’s Tel Aviv University for publishing their presenter’s tremendous Cyber Week 2023 security content on the Tel Aviv University’s TAUVOD YouTube channel.
Defining “storytelling” in an InfoSec context Inspiration - We the People: Democratizing Security “Storytelling” is a word that you will hear frequently within Duo’s creative team — now part of a Brand & Strategy unit for Cisco’s rebranded security organization Cisco Secure. But where to begin?
Firstly, thanks to a Zoom session with participants and presenters from Queensland, I've been reading-up on "industry 4.0". If so, you may be CISO material!] Today I've been thinking about 'the new normal' as the world emerges from the pandemic, inspired by the intersection of two threads.
and will continue going forward, presenting strategic challenges and opportunities to those who are awake to the possibilities ahead (both positive and negative), sufficiently resilient to cope with adversity yet resourceful, strong enough and well-positioned to surge forward when it makes sense. Are we even on the same planet?
As such, when you think about everything, be it basic security hygiene, information risk management, or even behavioral infosec, you must first consider how it fits with org culture. Behavioral InfoSec. Instead, be aware that your basics come first (out of necessity), then comes some form of risk mgmt.,
We include them because they are useful examples to study and learn from: some may find their way into board presentations or budget requests. The Ars piece also called out the “impressive” hacking of iPhones through Wi-Fi. Others should prompt checks to see if similar weaknesses exist in your infrastructure. .
Chris’s Cybersecurity Journey Starting his career on a help desk for a Fortune 200 energy firm, Christopher’s path to infosec is a testament to the many unexpected routes leading to cybersecurity expertise. ” As Chris and I discuss, social engineering attacks are the first step in many sophisticated attacks.
So as you both look around and see the experiences of other women in infosec today, do you feel like the opportunities have improved? I almost feel like being female in infosec is an advantage right now because people are looking to diversify their leadership. I figured people would remember me. We got noticed. How has it evolved?
We constantly see new threats, and threat vectors, come and go; which puts a tremendous strain on the InfoSec teams that have to protect organizations and businesses from these threats. Cyber Observer’s partnership with Cisco enables CISOs to manage and monitor their cybersecurity eco-system posture. Read more here. [9]
The fact is that they'd hired a new General Counsel who also claimed a security background (he had a CISSP), and thus they made him the CISO. Finally, my old manager from AOL reached out as he was starting a CISO role at Ellucian. 6 months later they eliminated the position. We were stranded in a dead economy and had no place to go.
Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. The recent Verkada incident serves as a stark reminder, emphasizing the pressing need for CISOs to prioritize integrated IoT security and privacy in their strategic considerations.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content