article thumbnail

What is Traffic Light Protocol? Here's how it supports CISOs in sharing threat data

CSO Magazine

Traffic Light Protocol (TLP) was created to facilitate greater sharing of potentially sensitive threat information within an organization or business and to enable more effective collaboration among security defenders, system administrators, security managers, and researchers.

article thumbnail

50% of CISOs say the push for rapid growth and digital transformation stalls cloud security

SC Magazine

New research found that half of CISOs surveyed say their organization’s desire for growth and rapid digital transformation has become detrimental to achieving data security in the cloud. The post 50% of CISOs say the push for rapid growth and digital transformation stalls cloud security appeared first on SC Media.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

Starting out on a help desk, Chris worked his way up to roles as a system administrator and network engineer, eventually taking the IT helm at a power provider with a portfolio of over 30 North American plants, including three nuclear facilities.

CSO 52
article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017. Director/CISO of IT Risk Management. Director/CISO of IT Risk Management at Ulta Beauty located in Bolingbrook, IL. Alexandra holds a B.S. Diane Brown. Ulta Beauty.

article thumbnail

New Paper: “Autonomic Security Operations?—?10X Transformation of the Security Operations Center”

Anton on Security

10X Transformation of the Security Operations Center” It is with much excitement that we announce a new paper about transforming your security operations ; it is published under the Office of the CISO at Google Cloud. This work is focused on our vision as well as our lessons in building effective security operations for the future.

article thumbnail

Red Team vs Blue Team vs Purple Team: Differences Explained

eSecurity Planet

Blue team members might be led by a chief information security officer (CISO) or director of security operations, making this team the largest among the three. Blue teams consist of security analysts, network engineers and system administrators.

article thumbnail

University of Phoenix Recognized With 2021 Academic Circle of Excellence Award by EC-Council, World’s Largest Cybersecurity Certification Body

CyberSecurity Insiders

This consists of partnered academic institutions, commercial training centers, corporate organizations, CISO’s, Certified EC-Council Instructors (CEI’s), and academic faculty. years of professional experience. About EC-Council.