article thumbnail

Ostrich Cyber-Risk Welcomes Risk Management Expert Jack Whitsitt as Director of Risk Quantification

Security Boulevard

Jack Whitsitt, former InfoSec Risk Quantification Program Architect at. Freddie Mac, joins Ostrich Cyber-Risk as the Director of Risk. Quantification to inform product direction and lead the Professional. Services division.

article thumbnail

InfoSec Leaders Weigh in on New SEC Rules Making CISO Hotseat Hotter

SecureWorld News

Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. For sanity, manage to a written information security policy.

CISO 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s Challenges

The Security Ledger

The information security industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts. The post Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s Challenges appeared first on The.

InfoSec 52
article thumbnail

Episode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cyber Risk

The Security Ledger

Here’s the deal with the information security industry in the United States: our country doesn’t have nearly the number of information security professionals that it needs. According to an estimate from Cybersecurity Ventures, the shortage of US cyber security workers could reach 500,000 people in 2021.

article thumbnail

Cyber Playbook: Information Technology vs Operational Technology – How to Leverage IT to Secure Your OT Systems

Herjavec Group

Information Technology (IT) primarily refers to hardware, software, and communications technologies like networking equipment and modems that are used to store, recover, transmit, manipulate, and protect data. . Simply put, OT devices and networks should be brought into the Information Technology security realm of control. .

article thumbnail

How security pros, the insurance industry, and regulators can combat ransomware

SC Magazine

Rather than rely solely on factors like compliance or case law developing over time, embracing a risk management coordination role can help insurers take the fight to ransomware. Have insurers and infosec professionals coordinate closely on security risk metrics. Foresight in cyber insurance can come by way of predictive models.

Insurance 113
article thumbnail

Assessing the Human Element in Cyber Risk Analysis

Threatpost

The human factor doesn't have to be an intangible when assessing cyber risks within a company.