article thumbnail

Black Hat insights: JupiterOne’s whodunnit puts CISOs on the trail of solving a devastating breach

The Last Watchdog

Related: A call to regulate facial recognition That said, a few dozen CISOs attending Black Hat USA 2023 will get to experience, hands-on, what it must have been like to be in the crucible of milestone hacks like Capital One, SolarWinds and Colonial Pipeline. San Diego or New York City , feel free to skip ahead.

CISO 203
article thumbnail

How a Zero-Trust Browser Helps CISOs Tackle Cybersecurity

Security Boulevard

Today’s CISOs and IT teams face unprecedented challenges—keeping up with ever more sophisticated cybercriminals, managing multiple security stacks, dealing with increasing security gaps caused by unmanaged devices in remote and hybrid work structures and more.

CISO 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Generative AI and Cybersecurity: The Impact on CISOs and Security Teams

Security Boulevard

The post Generative AI and Cybersecurity: The Impact on CISOs and Security Teams appeared first on LogRhythm. The post Generative AI and Cybersecurity: The Impact on CISOs and Security Teams appeared first on Security Boulevard.

CISO 67
article thumbnail

3 Cybersecurity Goals for CISOs

Security Boulevard

The post 3 Cybersecurity Goals for CISOs appeared first on Security Boulevard. Honestly, how many of us had, “I will do my best to avoid a global pandemic,” as a New Year’s resolution for 2020? That said, the chances that 2021 will be even more unpredictable are slim. So, we might as well indulge in setting.

CISO 145
article thumbnail

Should the CISO Report to the CIO?

Cisco Security

The Chief Information Security Officer (CISO) is the organization’s senior executive in charge of the cybersecurity and the information technology risk management posture of the enterprise. federal government in particular, the CISO reports to the Chief Information Officer (CIO). In many organizations, and in the U.S.

CISO 111
article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

When developing a security strategy for supporting a hybrid workforce, it is essential to identify risks, as well as any potential blind spots. As CISOs embark on their transformational journeys, identifying these areas of weakness should be the top priority. Security landscape requires adaptation .

CISO 91
article thumbnail

Top Gun and Zero Trust: Lessons in Cybersecurity for the CISO and CIO

CyberSecurity Insiders

Now that we know what’s driving zero trust adoption let’s shift to how zero trust can help the CISO and CIO of a company be more secure, which I will do by drawing on the lessons and characters of “Top Gun”! At its core, zero trust is a security model that assumes all networks, devices, and users are potentially hostile.

CISO 134