This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Security and Exchange Commission (SEC) recently laid down the hammer charging and fining four prominent cybersecurity vendors for making misleading claims in connection with the SolarWinds hack. Joe Nicastro , Field CTO, Legit Security Nicastro Transparency in cybersecurity remains a complex balancing act.
Professional risk factors into career decisions, and successful women need to encourage other women to accept the risks, says Accenture. The post Report finds women are declining CISO/CSO roles appeared first on TechRepublic.
In this post, Tenable CIO Patricia Grant looks at how the CIO/CSO relationship is key to a successful exposure management program. When I first joined Tenable, one of the first things I did was sit down with our CSO, Robert Huber , to align on how we were going to work together. And we both bring something essential to the table.
Any lingering indifference to cybersecurityrisk has evaporated in the face of spiking ransomware attacks, software supply chain threats , and the challenges of securing remote workers. Unsurprisingly, half of those surveyed said they had seen an increase in security incidents at their organizations over the past year.
KrebsOnSecurity reviewed the Web sites for the global top 100 companies by market value, and found just five percent of top 100 firms listed a chief information security officer (CISO) or chief security officer (CSO). Not that these roles are somehow more or less important than that of a CISO/CSO within the organization.
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Nor is the average pay hugely different among all these roles.
One of my friends, Greg van der Gaast tells this great story that perfectly illustrates one of the biggest challenges we face in cybersecurity today. ” This simple analogy speaks volumes about how cybersecurity operates today. To achieve true resilience in cybersecurity, we need to break out of this tech-first mindset.
Cybersecurity has steadily crept up the agenda of governments across the globe. This has led to initiatives designed to address cybersecurity issues that threaten individuals and organizations.
I don’t know how many times I’ve heard cybersecurity professionals say something like, “Not having multi-factor authentication is a huge risk for our organization.” The real risk is the probability of a ransomware incident, for example, or the leak of personally identifiable information (PII) from a customer database.
Cybersecurity buzzwords and buzz phrases are a dime a dozen. However, such terms are not always helpful and can be inaccurate, outdated, misleading, or even risk causing harm. Learn 8 pitfalls that undermine security program success and 12 tips for effectively presenting cybersecurity to the board.
The cybersecurity mantra at Jefferson Health is “if we can’t do it well, we’re not going to do it” says Mark Odom, CISO of the Philadelphia-based healthcare organization. Learn the 7 keys to better risk assessment. | Get the latest from CSO by signing up for our newsletters. ]. Learn the 7 keys to better risk assessment. |
The US General Accountability Office (GAO) issued the 19-page report , “Cybersecurity and Information Technology: Federal Agencies need to Strengthen Efforts to Address High-Risk Areas” on July 29. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.
Check out best practices for shoring up data security and reducing cyber risk. 1 - CSA: How to boost data security and reduce cyber riskRisk assessment gaps. 1 - CSA: How to boost data security and reduce cyber riskRisk assessment gaps. Plus, get tips on how to improve job satisfaction among tech staff.
CISO Bill Brown knows how high-profile cybersecurity breaches like SolarWinds can raise alarm bells among executives and board members when they become headline news. But nothing more than that.” [ Learn the 7 keys to better risk assessment. | Get the latest from CSO by signing up for our newsletters. ]. Could this happen to us?
Understanding why this is happening and exploring what lies ahead is essential for organizations aiming to sustain effective cybersecurity leadership. Stress and burnout are leading contributors, with 60% citing stress and 53% citing burnout as risks that could prompt them to leave.
The US Cybersecurity and Infrastructure Security Agency (CISA) has started a list of what it deems to be bad security practices. Get the latest from CSO by signing up for our newsletters. ] The two on the list so far instruct any organization that provides national critical functions (NCF) what not to do.
If your company is participating in the global supply chain, either as a first-party purchaser of goods and services from other organizations, or as a third-party supplier, sooner or later you’ll encounter the NIST Cybersecurity Framework. This includes not just the NIST CSF, but also the newly minted NIST Risk Management Framework 2.0,
But this time, it is the Treasury Inspector General for Tax Administration auditing the IRS, the agency's legacy IT environment and its cybersecurity. What does effective asset management look like from a cybersecurity perspective? Aflac CSO Tim Callahan told us as much after his keynote at a SecureWorld conference last year.
CISOs are no longer only responsible for the cybersecurity of systems used internally. In many organizations they also focus on securing products and public-facing applications, and one way to do this well is through risk assessment.
Lack of a program signals data may be at risk when equipment is recycled; presence of a program signals attention to data protection. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
The threat of litigation is enough to keep any business leader up at night, and the increasing prevalence of data protection, privacy, and cybersecurity legislation and regulation is piling on the pressure for CISOs.
SAN FRANCISCO The cybersecurity industry showed up here in force last week: 44,000 attendees, 730 speakers, 650 exhibitors and 400 members of the media flooding Moscone Convention Center in the City by the Bay. Jay” Abdullah , Mastercards Deputy CSO who gave a keynote address at The CSA Summit from Cloud Security Alliance at RSAC 2025.
In this post, we look at a few of the highlights, focusing on the work of three Tenable thought leaders: information security engineer Arnie Cabral, CSO Robert Huber and CIO Patricia Grant. We knew that, although it is critical to modern cybersecurity, vulnerability management alone doesnt provide a complete picture of cyber risk, he wrote.
That means cybersecurity training and education so that key stakeholders understand the risks that businesses are facing, and which strategies are most effective for protection. Who should receive cybersecurity training in your organization? How much depends on the extent of the CIO’s involvement in cybersecurity.
Despite the billions of dollars poured annually into cybersecurity by investors, organizations, academia, and government, adequate and reliable cybersecurity remains an ever-elusive goal. Chief among the challenges for decision-makers and experts is simply identifying and comprehending society's cybersecurityrisks.
Business leaders spend most of their time conducting risk/reward analyses of virtually every decision they make. Cybersecurity is another critical area where risk must be constantly assessed. The risk of unanticipated service interruptions—not to mention the many direct and indirect costs of data loss—is substantial.
Plus, find out how your company can create a better cybersecurity environment. Here’s why ” (SC World) “ Quantum and the Threat to Encryption ” (SecurityWeek) 2 - How to establish a great cybersecurity culture in your org Corporate culture can have a major impact on the success or failure of a company’s cybersecurity efforts.
From a cybersecurity standpoint, organizations are operating in a high-risk world. The ability to assess and manage risk has perhaps never been more important.
Learn the 7 keys to better risk assessment. | Get the latest from CSO by signing up for our newsletters. ]. The new proposals could require MSPs to meet the current Cyber Assessment Framework , a set of 14 cybersecurity principles designed for organisations that play a vital role in the day-to-day life of the UK.
Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. To ensure cybersecurity becomes a strategic part of the corporate culture, it is crucial for CISOs to present the topic in a clear, concise, and compelling manner.
The risk of cybercrime is not spread equally across the globe. Cyberthreats differ widely, with internet users in some countries at much higher risk than those in nations that offer more security due to strong cybercrime legislation and widely implemented cybersecurity programs, according to fraud-detection software company SEON.
In December 2020, the US Government Accounting Office (GAO) made 145 recommendations to 23 federal agencies relating to supply chain risks. In May 2021, the GAO’s director of information technology and cybersecurity, Vijay A. D’Souza, testified before Congress on supply chain risks.
In a move that has raised concerns about the company's cybersecurity posture, Amy Bogac, Clorox's CISO, has stepped down from her position. Some speculate that Bogac may have been frustrated with the company's slow response to the cyberattack and its lack of investment in cybersecurity measures.
[Tel Aviv, Israel – March 16, 2022 ] – Researchers from Cider Security , the world’s first AppSec Operating System, today published a new research report, “Top 10 CI/CD Security Risks”, detailing the major security risks to the CI/CD (Continuous Integration/Continuous Delivery) ecosystem. . “CI/CD The risks outlined are: .
In this special edition of the Cybersecurity Snapshot, were highlighting some of the most valuable guidance offered by the U.S. Cybersecurity and Infrastructure Security Agency in the past 12 months. In case you missed it, heres CISAs advice on six cybersecurity areas. Coast Guard conducted in 2023.
Those initiatives—especially those prioritizing remote or hybrid working, new digital services for customers and citizens, and increased outsourcing of remote vendors and suppliers—have created hundreds of thousands of new digital identities in each organization, which can increase their exposure to cybersecurityrisk.
million people was exposed in a data breach lasts year, prompting AppOmni CSO Cory Michal to say that data collection companies like DISA and National Public Data need more oversight, regulations, and penalties. The post DISA Breach Highlights Need for Stronger Oversight: AppOmni CSO appeared first on Security Boulevard.
Cybersecurity and risk expert David Wilkinson has heard some executives put off discussions about risk acceptance, saying they don’t have any appetite or tolerance for risk. Yet there are indicators that many CISOs aren’t having productive conversations around risk acceptance.
The guide, quietly published in late July, is in essence a primer on how to create an insider risk/insider threat program. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan. Sign up for CSO newsletters. ]. NCSC and CDSE insider threat program guidance.
Welcome to the latest edition of The Week in Security , which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, and beyond. This week: Former Uber CSO is convicted for his attempted cover-up of a 2016 hack of the company.
A core pillar of a mature cyber risk program is the ability to measure, analyze, and report cybersecurity threats and performance. That said, measuring cybersecurity is not easy. What can be measured in cybersecurity? To read this article in full, please click here
Effective partnerships between CISOs and their cybersecurity vendors are integral to security success. A well-oiled relationship built on trust, communication and mutual understanding can reap significant benefits for a business’s cybersecurity posture.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content