Remove CISO Remove InfoSec Remove Technology Remove Workshop
article thumbnail

CISO workshop slides

Notice Bored

Zero-trust - whatever that means to the presenter and audience; Cloud - meaning Azure, specifically; DevOps and DevSecOps - whatever those terms mean ; MS threat intelligence including artificial intelligence/machine learning rapid responses to novel malware (a cool idea, provided it works reliably).

CISO 63
article thumbnail

Security pros rely on peer groups and open communication for help with stress

SC Magazine

This nonstop barrage of security crises has made certain infosec leaders and practitioners more aware than ever of the job’s impact on mental healthy, and the importance to protect against stress, exhaustion and burnout. Corll said he closely interacts with about 20 other CISOs through the U.S.-based But how have they been managing?

InfoSec 113
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The discomfort zone

Notice Bored

That's a heady mix of laws and regs that apply to the organisation, its officers and workers, its property and finances, its technologies, its contracts, agreements and relationships with employees and third parties including the authorities, owners, suppliers, partners, prospects and customers, and society at large. Documented! Maintained!

Risk 72
article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

Respect the user’s privacy and productivity by anonymizing location data and eliminating unnecessary decisions when continually verifying trust. .” – Jason Waits, Chief Information Security Officer (CISO), Inductive Automation Ready to start charting your zero trust program? Or, download our white paper How to go from MFA to Zero Trust.

article thumbnail

Democratizing Threat Hunting: How to Make it Happen for Everyone

Cisco Security

With technology advancements and improved feature sets, including products like Cisco’s Secure Endpoint Premier with SecureX Threat Hunting puts threat hunting well within the reach of all companies, no matter the size or security maturation level they have already achieved. Attend a Threat Hunting Workshop. Beers with Talos Ep. #97:

Risk 109