Remove post-pandemic-presentation-plans
article thumbnail

Top 5 Security Trends this Summer: RSA Conference & Black Hat 2022

Webroot

The first in-person event for RSA since the global pandemic had a slightly lower turnout than in years past (26,000 compared to 36,000 attendees). Here are some of the key trends which we observed at this year’s first marquee cybersecurity event post-pandemic: 1. Cyber insurance becomes mainstream discussion.

article thumbnail

The challenges of being a CISO during the COVID-19 pandemic

IT Security Guru

The global COVID-19 pandemic has been a tumultuous time for Chief information security officers (CISOs) who on any given day have a long and complicated list of responsibilities. CISOs are no strangers to disruption and challenges, but during the pandemic they have faced many disruptions it has caused and created a wealth of new challenges.

CISO 55
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Here’s Why SMBs Need Improved Cybersecurity Now More Than Ever

Vipre

The shift to a more digital workflow as a result of the COVID-19 pandemic didn’t exactly help; unfortunately, 22 percent of SMBs transferred to remote work without any kind of threat prevention plan. There are a number of reasons that SMBs find themselves at risk for security breaches. Employee and customer records.

article thumbnail

Form risk operations centers to manage cyber as a business function

SC Magazine

With the security operations center (SOC) overwhelmed with monitoring, responding, and defending the enterprise, the thought of increasing the SOC’s responsibility to measuring risk and communicating it to management doesn’t fit the current SOC model. We see a new, dedicated function arising, the risk operations center (ROC).

Risk 66
article thumbnail

The GDPR, Year II

McAfee

The second major crisis is the COVID 19 pandemic, which presented new challenges, among them new tracing apps, the explosion of the use of remote workers at controllers, processors, and subprocessors, and questions about how employers ensure the health and safety of their workforce without compromising a data subjects privacy rights.

article thumbnail

Strong medical device security awareness stifled by inventory, knowledge gaps

SC Magazine

Throughout the course of the pandemic, health care providers swiftly onboarded new technologies and processes aimed to innovate and support patient care in troubling circumstances. In some organizations that run scans 24 hours a day, a need for a patch may not present until 48 hours at the earliest,” they added.

article thumbnail

Have board directors any liability for a cyberattack against their company?

Security Affairs

During the past few weeks, I had the pleasure of running a presentation on how to deal with the risk of ransomware cyberattacks on corporations for the benefit of members of the “ In the Boardroom ” training course dedicated to professionals who are or aspire to become board members of publicly traded companies.