Remove CISO Remove InfoSec Remove Security Awareness Remove Technology
article thumbnail

Hi-5 With A CISO Dmitriy Sokolovskiy, Avid Technology

Security Boulevard

CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Dmitriy Sokolovskiy has been working in the cybersecurity space for over 14 years in dedicated security roles, in addition to 9 more years working in various IT areas.

CISO 57
article thumbnail

Reducing InfoSec Threats Takes a Village

Security Boulevard

Chief executive officers and chief technology officers know this is a potentially existential threat both for their companies and for them professionally. The post Reducing InfoSec Threats Takes a Village appeared first on Security Boulevard. In 2021 alone we’ve seen data breaches impact many Fortune 500 companies.

InfoSec 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inflation Is Making Cybersecurity Even More Challenging for Leaders

SecureWorld News

We asked a few practitioners for their take on rising inflation and how it is making their jobs keeping their organizations secure more difficult—and what they are doing to try to combat these issues. "I Too many folks focus on the technology as opposed to the people or process. This is more critical now than it's ever been."

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Brian Levine is senior director of product security at Axway, a global security engineering organization delivering training, tools, processes and DevSecOps practices for secure applications and cloud services to the enterprise market. In government, Brooks served under President George W.

article thumbnail

The discomfort zone

Notice Bored

That's a heady mix of laws and regs that apply to the organisation, its officers and workers, its property and finances, its technologies, its contracts, agreements and relationships with employees and third parties including the authorities, owners, suppliers, partners, prospects and customers, and society at large. Documented! Maintained!

Risk 72
article thumbnail

Seven Massachusetts Cities Join Forces to Bolster Cybersecurity Posture

SecureWorld News

The city has a more established IT setup, including a full-time IT director, which many of the smaller towns lack, according to this Government Technology article. We use this type of model for our 'Whole of State' approach to security in North Dakota," says Michael Gregg, CISO for the State of North Dakota.

article thumbnail

The Quest for Optimal Security

The Falcon's View

There's no shortage of guidance available today about how to structure, build, and run a security program. Most guidance comes from a standpoint of inherent bias, whether it be to promote a product class, specific framework/standard, or to best align with specific technologies (legacy/traditional infrastructure, cloud, etc.).

InfoSec 40