Remove CISO Remove Media Remove Security Awareness Remove Technology
article thumbnail

How CISOs Can Impact Security for All

Cisco Security

Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.

CISO 96
article thumbnail

Mitigate insider threats by focusing on people, process and technology

SC Magazine

of Proofpoint, says as companies shifted to work-from-home during the pandemic, security pros had to focus more on insider threats, sometimes caused by harried parents juggling work and family responsibilities. CISOs need to promptly identify risky behavior and determine whether that threat warrants additional research. Lucia Milic?,

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Managing the great return: What CISOs should consider when reopening the office

SC Magazine

Ideally, “organizations had crisis management programs activated a year ago,” said Andrew Turner, senior vice president in Booz Allen’s cybersecurity services, bringing together human resources, security teams, technology, and executive management. A second, more nuanced problem relates to technology.

CISO 121
article thumbnail

Strong medical device security awareness stifled by inventory, knowledge gaps

SC Magazine

Armis researchers surveyed more than 2,000 professionals in May, which showed most users don’t pay attention to major cybersecurity attacks against critical infrastructure and operational technology entities, such as the attack against Colonial Pipeline in early May. in the last year and the continued rise in cyber events.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Today, c yber security incidents lead to significant damage, alarming organizations of all types and sizes in different geographic locations. The contemporary world has witnessed the rise of the Internet and global communication, and collaboration technologies, including mobile data use and the culture of bring your own device [BYOD].

article thumbnail

How to build a zero trust ecosystem

SC Magazine

With its tailored controls, micro-perimeters and trust-nothing approach to access, Zero Trust gives CISOs confidence that their security program can secure their remote workforce and meet regulatory compliance requirements. The post How to build a zero trust ecosystem appeared first on SC Media.

CISO 134
article thumbnail

Spotlight on Cybersecurity Leaders: Diego Maldonado

SecureWorld News

I had an opportunity to join federal government as a computer specialist with varying roles that took on a life of their own within the technology field. A : Regulatory action restricting the need for an individual to provide so much PII or sensitive information in order to operate within the social media or in some cases business realm.