Remove CSO Remove Data privacy Remove Risk Remove Technology
article thumbnail

BrandPost: Safe at Any Speed: Formalizing Consumer Privacy Risk Management

CSO Magazine

As regulators and legislators consider new approaches to addressing consumer privacy, CISO s and colleagues in technology and consumer products companies that use personal data should reconsider how they’re balancing their management of data privacy risks and the need for speed.

Risk 74
article thumbnail

Importance of Cybersecurity Profession Highlights SecureWorld Chicago

SecureWorld News

And so we think about different types of cybersecurity risk and how those risks or vulnerabilities or threat actors can actually impede that ability or an organization to meet those objectives," said Mary Faulkner, CISO at Thrivent, one of four panelists that took the stage to kick off the conference.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Wells Notice Against SolarWinds CISO Could Be First of Its Kind

SecureWorld News

It will be interesting to watch how the SEC navigates this next stage and its broader impact on the approach by executives in managing cyber risk." While these Wells Notices are official investigations, they are a sign of a potential intent to investigate the CISO and CFO.

CISO 90
article thumbnail

MY TAKE: NIST Cybersecurity Framework has become a cornerstone for securing networks

The Last Watchdog

Prior to launching CyberSaint, Wrenn was CSO of Schneider Electric, a supplier of technologies used in industrial control systems. The participation led to the idea behind CyberSaint The company supplies a platform, called CyberStrong, that automatically manages risk and compliance assessments across many types of frameworks.

article thumbnail

Why the modern CISO should plan for greater Cybersecurity Regulations in the Biden Era

SC Magazine

Achieve Compliance and Data Privacy Regulation Standardization at the Federal Level. James Carder, CSO, LogRhythm. In March 2021, President Biden signed the $1.9 This is an important factor to highlight because it demonstrates that common ground already exists to define a basic security regulation for all nations.

CISO 96
article thumbnail

Episode 251: Kry10 CEO Boyd Multerer on building a secure OS for the IoT

The Security Ledger

A study of the security of IoT devices by Phosphorus Labs , a cybersecurity company, found that 68% of devices studied contained high-risk or critical software vulnerabilities. Related Stories Episode 250: Window Snyder of Thistle on Making IoT Security Easy Forget the IoT.

IoT 52
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

According to thought leaders, the compromise of video data could result in intellectual property theft, physical security threats, privacy violations, extortion and perhaps regulatory punishment. It’s best practice to keep a different set of credentials for each device because of exactly this risk.”.