Remove CISO Remove InfoSec Remove Presentation Remove Risk
article thumbnail

Assessing Third-Party InfoSec Risk Management

Security Boulevard

Information security (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency due to the primary business risk it presents. The post Assessing Third-Party InfoSec Risk Management appeared first on Security Boulevard.

InfoSec 96
article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISO workshop slides

Notice Bored

Zero-trust - whatever that means to the presenter and audience; Cloud - meaning Azure, specifically; DevOps and DevSecOps - whatever those terms mean ; MS threat intelligence including artificial intelligence/machine learning rapid responses to novel malware (a cool idea, provided it works reliably).

CISO 63
article thumbnail

Spotlight on Cybersecurity Leaders: Bill Bowman

SecureWorld News

He has been a first-hired CISO at five different companies. A : When I was with Bright Horizons, many top-tier clients demanded InfoSec competence. A : I started 16 quarters ago when the company needed its first CISO. A : Moving the reporting line to risk (GC/CLO); using AI. I learned from them. I learned from them.

article thumbnail

Inside the Complex Universe of Cybersecurity

SecureWorld News

Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. While it fosters innovation, automation, and productivity, it simultaneously introduces significant cybersecurity and privacy risks.

article thumbnail

My Top 5 Blogs of the Year

Javvad Malik

So, I proudly present, my top 5 read blogs during the course of 2020. 5: Writing better risk statements Do you struggle to articulate security risks? 2: Why Predator is the ultimate CISO movie I really enjoyed writing this – and was surprised at how much love and attention this got. From my blog that is.

InfoSec 100
article thumbnail

CyberSaint STRONGER 2022 Conference Call for Speakers is Open!

CyberSecurity Insiders

BOSTON–( BUSINESS WIRE )– CyberSaint , the developer of the leading platform delivering cyber risk automation, today announced that the company is seeking speaker submissions for its virtual STRONGER conference, set to occur September 13th-15th 2022. Conference Tracks: Frameworks, Security, & Risk. InfoSec 360.