article thumbnail

Author Q&A: Former privacy officer urges leaders to prioritize security as part of cloud migration

The Last Watchdog

Cyber threats have steadily intensified each year since I began writing about privacy and cybersecurity for USA TODAY in 2004. A good start would be to read Mobilizing the C-Suite: Waging War Against Cyberattacks, written by Frank Riccardi, a former privacy and compliance officer from the healthcare sector.

article thumbnail

5 Cyber Trends to Expect in 2024

NetSpi Executives

From the emergence of the MOVEit vulnerability to the wide adoption of ChatGPT and its associated security risks, nearly every industry was impacted by cyber threats. More importantly, we will see the emergence of very impactful use cases in industry verticals such as healthcare, learning, manufacturing, and automation.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

GUEST ESSAY: Leveraging best practices and an open standard to protect corporate data

The Last Watchdog

As the economy grows increasingly data-driven, and as cyber threats proliferate, business leaders recognize they must find a more effective approach to protecting their intellectual property, financial records, employee and customer information, and other sensitive data — while also ensuring their employees’ access to that data is not hindered.

article thumbnail

SPOTLIGHT: Women in Cybersecurity

McAfee

Alexandra Heckler is Chief Information Security Officer at Collins Aerospace, where she leads a diverse team of cyber strategy and defense experts to protect against cyber threats and ensure regulatory compliance. Collins Aerospace.

article thumbnail

CASB: Decisive Role of Cloud Access Security Brokers

Spinone

It allows them to take advantage of the cost effective and easy to use cloud-based applications such as G Suite , Office 365, Salesforce, and other. Cloud security practitioners keep exploring new mechanisms capable to make smooth and secure transition to the cloud, and adjusting existing digital risk management practices.

Risk 60