article thumbnail

Athletic shoe maker Brooks runs down cyberattacks with zero-trust segmentation

CSO Magazine

Ransomware was again the top attack type in 2021, with manufacturing replacing financial services as the top industry in a Brooks. Jon Hocut, director of information security for Brooks To read this article in full, please click here

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. Prior to Mastercard, Abdullah was the chief information security officer at Xerox, where she established and led a corporate-wide information risk management program.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Importance of Cybersecurity Profession Highlights SecureWorld Chicago

SecureWorld News

Well, information security, cybersecurity happens to be a critical part of the business, being able to achieve strategic objectives. Buerger recently joined Kraft Heinz as its Business Information Security Officer after serving as CISO at a smaller company.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

Cyber threat management , being an advanced discipline, craves analytical attention and a commander’s strategic skills of information security executives to confront and overcome the multi-dimensional cyber threats.

article thumbnail

The Hacker Mind: Shattering InfoSec's Glass Ceiling

ForAllSecure

She’s an amazing person who has done an amazing number of things in a short amount of time -- CMU professor, Forrester analyst, CSO at a successful startup -- and she’s not done changing the industry. What if you are a woman in information security? That is, until Chenxi Wang spoke up. And the good news?

InfoSec 40
article thumbnail

Camera tricks: Privacy concerns raised after massive surveillance cam breach

SC Magazine

granting them access to live and archived video feeds across multiple organizations, including manufacturing facilities, hospitals, schools, police departments and prisons. These devices should be considered as an integral part of the software system and should be subject to the same design principles one has in secure software.”.