article thumbnail

Live Webinar: Overcoming Generative AI Data Leakage Risks

The Hacker News

As the adoption of generative AI tools, like ChatGPT, continues to surge, so does the risk of data exposure. According to Gartner’s "Emerging Tech: Top 4 Security Risks of GenAI" report, privacy and data security is one of the four major emerging risks within generative AI.

Risk 74
article thumbnail

What Your Auditor Looks for in Your Risk Management Process

Security Boulevard

TrustCloud teamed up with Dansa D’Arata Soucia on our Risk Rodeo webinar, to discuss everything you need to know to wrangle up risks with confidence. The post What Your Auditor Looks for in Your Risk Management Process appeared first on Security Boulevard.

Risk 97
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

4 Key Takeaways from "XDR is the Perfect Solution for SMEs" webinar

The Hacker News

Many SMEs understand this risk firsthand. In a recent survey, 58% of CISOs of SMEs said that their risk of attack was higher compared to enterprises. So, you may be surprised to learn that small and medium enterprises (SMEs) are actually more frequent targets of cyberattacks.

CISO 71
article thumbnail

Mitigating Insider Threat Risk in Financial Services

SecureWorld News

John Checco, Resident CISO at Proofpoint, says it is usually the amount of drama involved. Director, Infrastructure Security at FINRA on the SecureWorld broadcast Mitigate Insider Risk in Financial Firms. Insider threat webinar now available on demand. The webinar also looks at the following: Who owns insider threat risk?

article thumbnail

Meet The Team Behind Mayhem: Come See Us At These Upcoming May 2023 Events

ForAllSecure

We participated in B Sides last month, hosted a webinar on “How to Increase Test Coverage With Mayhem for API”, and hosted a university hackathon at UC Santa Cruz. Join the Mayhem team in our upcoming webinar to learn how to identify and address vulnerabilities in open-source libraries. When : May 24, 10 a.m. PT / 1 p.m.

article thumbnail

Water utility CISO offers tips to stay secure as IT and OT converge

SC Magazine

Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. However, such modernization is not without risk. Route 66 runs through downtown Albuquerque, New Mexico. Asaavedra32, CC BY-SA 3.0

CISO 82
article thumbnail

These Roles Require Cybersecurity Training

CyberSecurity Insiders

That means cybersecurity training and education so that key stakeholders understand the risks that businesses are facing, and which strategies are most effective for protection. Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO.