Remove Cyber Risk Remove Digital transformation Remove Presentation Remove Technology
article thumbnail

MY TAKE: Why ‘basic research’ is so vital to bringing digital transformation to full fruition

The Last Watchdog

Basic research is the foundational theorizing and testing scientists pursue in order to advance their understanding of a phenomenon in the natural world, and, increasingly, in the digital realm. We need to pick-up some by-products from our cutting-edge technologies, and it should be aligned with our future technologies.”.

article thumbnail

Webinar Recap: Mitigating Cyber Risks

SecureWorld News

What is the difference between a day at the beach and managing a cyber risk assessment plan? I have a risk of getting sunburned, but just because I am at the beach does not mean I’m going to get sunburned … What’s the best use of your limited resources that require some analysis?”.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

RSAC insights: How ‘TPRM’ can help shrink security skills gap — while protecting supply chains

The Last Watchdog

This is because third-party risk has become a huge problem for enterprises in the digital age. More so than ever, enterprises need to move beyond check-the-box risk assessments; there’s a clear and present need to proactively mitigate third-party risks. Cyber risks profiling.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

What’s happening is that supply chains are becoming more intricate and far-flung the deeper we move into digital transformation and the Internet of Things. And opportunistic threat actors are proving adept as ever at sniffing out the weak-link third parties in any digital ecosystem. Uphill battle. Model sharing.

article thumbnail

CyberSaint STRONGER 2022 Conference Call for Speakers is Open!

CyberSecurity Insiders

BOSTON–( BUSINESS WIRE )– CyberSaint , the developer of the leading platform delivering cyber risk automation, today announced that the company is seeking speaker submissions for its virtual STRONGER conference, set to occur September 13th-15th 2022. Conference Tracks: Frameworks, Security, & Risk.

article thumbnail

MY TAKE: Log4j’s big lesson – legacy tools, new tech are both needed to secure modern networks

The Last Watchdog

By no means has the cybersecurity community been blind to the complex security challenges spinning out of digital transformation. Left unpatched Log4Shell vulnerabilities present easy paths for a threat actor to take full control of the underlying system. Many more Gordian-knot issues that need to be dealt with, to be sure.

Firewall 223
article thumbnail

RSA Conference 2022 Back to Physical - The Thrill of Meeting in Person!

Thales Cloud Protection & Licensing

As the world changes and new technologies emerge, shaping our future, being able to secure these advances and offer a safer digital landscape is of crucial importance. On the flip side, awareness of the necessity to prioritize budget and resources to reduce cyber risk is at an all-time high. Digitally transform with 5G.