Remove Cyber Risk Remove Digital transformation Remove InfoSec Remove Technology
article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

article thumbnail

CyberSaint STRONGER 2022 Conference Call for Speakers is Open!

CyberSecurity Insiders

BOSTON–( BUSINESS WIRE )– CyberSaint , the developer of the leading platform delivering cyber risk automation, today announced that the company is seeking speaker submissions for its virtual STRONGER conference, set to occur September 13th-15th 2022. Conference Tracks: Frameworks, Security, & Risk. InfoSec 360.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight Podcast: RSA CTO Zulfikar Ramzan on confronting Digital Transformation’s Dark Side

The Security Ledger

In this Spotlight Edition of the podcast we're speaking with RSA Chief Technology Officer Zulfikar Ramzan about how his company is adapting to help its customers confront the dark side of digital transformation initiatives: increased digital risk, including from cloud, artificial intelligence and the Internet of Things.

article thumbnail

Cyber CEO: The Cybersecurity Skills Gap – How to Address it Now and in the Future

Herjavec Group

The cybersecurity skills gap has continued to be a problem – one that’s only gotten worse due to the pandemic and digital transformation that most organizations recently experienced. Ask them for a quick virtual coffee or phone call, get out to the many infosec events, and engage with the community !

article thumbnail

Cyber CEO: A Look Back at Cybersecurity in 2021

Herjavec Group

For cyber actors, it’s a lucrative cyber attack option that can be delivered in various ways. On top of this, the consequences of rapid digital transformation due to the COVID-19 Pandemic created the perfect storm for successful ransomware attacks. I truly believe that your people are your first line of defense.

article thumbnail

Cyber CEO: Cybersecurity in 2021 – What We’ve Learned So Far

Herjavec Group

This means learning from the successes and the failures and using those learnings to enhance security measures, standards, and technology. It’s a lucrative cyber attack option and can be delivered in various ways. Operating with a team of individuals who are cybersecurity savvy is one of the best tools for cyber risk management.

article thumbnail

Top Breach and Attack Simulation (BAS) Vendors

eSecurity Planet

Breach and attack simulation (BAS) is a relatively new IT security technology that can automatically spot vulnerabilities in an organization’s cyber defenses, akin to continuous, automated penetration testing. DXC Technology. DXC Technology. SafeBreach holds multiple patents and awards for their BAS technology.