article thumbnail

Black Hat insights: JupiterOne’s whodunnit puts CISOs on the trail of solving a devastating breach

The Last Watchdog

Related: A call to regulate facial recognition That said, a few dozen CISOs attending Black Hat USA 2023 will get to experience, hands-on, what it must have been like to be in the crucible of milestone hacks like Capital One, SolarWinds and Colonial Pipeline. San Diego or New York City , feel free to skip ahead.

CISO 245
article thumbnail

CISO Stories Podcast: Which Approach Wins – Compliance or Risk?

Security Boulevard

Is it really security? LBMC’s Mark Burnette joins the podcast as the differences between compliance and true security are discussed - check it out. The post CISO Stories Podcast: Which Approach Wins – Compliance or Risk? appeared first on Security Boulevard.

CISO 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

3 Reasons Why CISOs are Prioritizing Cyber Risk Quantification

Security Boulevard

Recently, I was part of four conversations with security leaders across several industries – manufacturing, financial services, natural resources and healthcare – about some of the challenges they face with cyber risk management.

article thumbnail

Sisense Hacked: CISA Warns Customers at Risk

Security Boulevard

The post Sisense Hacked: CISA Warns Customers at Risk appeared first on Security Boulevard. A hard-coded credential catastrophe: The analytics firm kept big companies’ secrets in an insecure AWS bucket. Government says victims include the “critical infrastructure sector.”

Risk 139
article thumbnail

Should the CISO Report to the CIO?

Cisco Security

The Chief Information Security Officer (CISO) is the organization’s senior executive in charge of the cybersecurity and the information technology risk management posture of the enterprise. federal government in particular, the CISO reports to the Chief Information Officer (CIO). In many organizations, and in the U.S.

CISO 109
article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

Given the connectivity needs of a remote workforce – and knowing a hybrid workforce is here to stay – many IT teams have had to make sudden changes in the way workers connect to corporate systems that could introduce new cyber risks and vulnerabilities. . Security landscape requires adaptation .

CISO 97
article thumbnail

Why an HR-IT Partnership is Critical for Managing Cybersecurity Risk

Security Boulevard

The post Why an HR-IT Partnership is Critical for Managing Cybersecurity Risk appeared first on Security Boulevard. By aligning priorities into a shared game plan, HR and IT can finally set their organizations up to defend against modern cyberthreats.

Risk 130