2020 Workshop on Economics of Information Security

Schneier on Security

The Workshop on Economics of Information Security will be online this year. Uncategorized conferences economics of securityRegister here.

UK new information security commissioner is John Edwards

CyberSecurity Insiders

United Kingdom has issued a press update on the appointment of its next information commissioner and reports are because it is going to be John Edwards, who’s currently serving as Privacy Commissioner for New Zealand since 2014.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The 2020 Workshop on Economics and Information Security (WEIS)

Schneier on Security

The workshop on Economics and Information Security is always an interesting conference. Uncategorized conferences economics of securityThis year, it will be online. Here’s the program. Registration is free.

Jason Ruger, Chief Information Security Officer | Lenovo

StaySafeOnline

The post Jason Ruger, Chief Information Security Officer | Lenovo appeared first on Stay Safe Online

German Federal Office for Information Security (BSI) investigates Chinese mobile phones

Security Affairs

German Federal Office for Information Security is launching an investigation into the cybersecurity of certain Chinese mobile phones. The post German Federal Office for Information Security (BSI) investigates Chinese mobile phones appeared first on Security Affairs.

How to implement mindful information security practices

Tech Republic Security

Mindfulness is all about being aware, so why not incorporate that in your cybersecurity practices

On Opioids, Consultants and Information Security

Security Boulevard

The post On Opioids, Consultants and Information Security appeared first on Security Boulevard. Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Security Boulevard (Original) Spotlight Compliance data privacy law Information Security

SAIC Appoints Kevin Brown as Chief Information Security Officer

Dark Reading

Industry leader with decades of information security experience manages SAIC’s security strategy and oversees critical cybersecurity operations

10 pioneering women in information security

CSO Magazine

So, it should come as no surprise that there are also many remarkable female pioneers in computer and information security. In the 1950s, women were calculating U.S. space missions, and by the 1960s they were programming mainframe computers.

Keeping criminal justice information secure with advanced authentication

Security Boulevard

The post Keeping criminal justice information secure with advanced authentication appeared first on Entrust Blog. The post Keeping criminal justice information secure with advanced authentication appeared first on Security Boulevard.

The Guide to Presenting Information Security’s Business Value

Security Boulevard

When it comes to information security and stressing the importance of cyber risk management, getting the whole company (especially the C-suite) on the same playing field becomes paramount. Security Bloggers Network

How to Build a Strong Information Security Policy

Security Boulevard

The post How to Build a Strong Information Security Policy appeared first on Hyperproof. The post How to Build a Strong Information Security Policy appeared first on Security Boulevard.

Tinder achieves certification in Information Security Management System

CyberSecurity Insiders

Tinder, the most popular dating app among millennials has achieved for the first time a certification in Information Security Management System that endorses that the user data on the company servers remains well protected from all kinds of cyber threats.

Why would a lawyer ever need an Information Security Professional?

CyberSecurity Insiders

As an information security professional, have you often found yourself frustrated by the growing collection of cyber-based rules, guidance, regulations, and contemplations that our lawmakers can conjure up? That requires consultation with an information security professional.

Web vulnerability classes in the context of information security certifications

Acunetix

For certifications such as CISSP, CISA, Security+, CASP+, or CySA+, web vulnerability classes make up only a small part of the knowledge required to pass the exam. The post Web vulnerability classes in the context of information security certifications appeared first on Acunetix.

The Top 10 Highest Paying Jobs in Information Security – Part 2

The State of Security

Information security is an exciting and rapidly growing field for individuals who are interested in protecting users and their data. The post The Top 10 Highest Paying Jobs in Information Security – Part 2 appeared first on The State of Security.

10 Tips for Maintaining Information Security During Layoffs

Dark Reading

Insider cyber threats are always an issue during layoffs -- but with record numbers of home office workers heading for the unemployment line, it's never been harder to maintain cybersecurity during offboarding

The Top 10 Highest Paying Jobs in Information Security – Part 1

The State of Security

According to Gartner, global spending on information security and risk management technology is expected to exceed $150 billion in 2021. The post The Top 10 Highest Paying Jobs in Information Security – Part 1 appeared first on The State of Security.

What Is Residual Risk in Information Security?

Heimadal Security

The post What Is Residual Risk in Information Security? appeared first on Heimdal Security Blog.

Jane Harper, Senior Director of Information Security Risk Management and Business Engagement | Eli Lilly

StaySafeOnline

The post Jane Harper, Senior Director of Information Security Risk Management and Business Engagement | Eli Lilly appeared first on Stay Safe Online

BSidesSF 2020 – Sourya Biswas’ ‘How The Coasts Approach Information Security Differently’

Security Boulevard

The post BSidesSF 2020 – Sourya Biswas’ ‘How The Coasts Approach Information Security Differently’ appeared first on Security Boulevard. Events Security Bloggers Network BSidesSF 2020 Conferences Cyber Security education Information Security

ISO/IEC 27002's overall and topic-specific information security policies 0/11

Notice Bored

of the forthcoming new 3rd edition of ISO/IEC 27002 recommends two complementary types of information security policies. Topic-specific policies are typically structured to address the needs of certain target groups within an organization or to cover certain security areas.

5 Ways artificial intelligence Is Being Used to Keep Sensitive Information Secure

Security Affairs

Artificial intelligence is an immensely helpful tool for businesses and consumers alike, how to use artificial intelligence to secure sensitive Information. By processing data quickly and predicting analytics, AI can do everything from automating systems to protecting information.

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Many college students tell me they want to be a hacker, an IT systems penetration tester, or other type of cyber security professional. Cyber InfoSec education infosec security awareness tools training

NTT Research Names Matthew Ireland Chief Information Security Officer

CyberSecurity Insiders

a division of NTT (TYO:9432), today announced that it has named Matthew Ireland Chief Information Security Officer (CISO). Most recently a consulting Practice Manager and Executive Security Strategist at NTT Ltd., SUNNYVALE, Calif.–(BUSINESS

CISO 52

Swiss Army Knife for Information Security: What Is Comprehensive Protection?

Threatpost

For example, the concept of SearchInform is to ensure control of threats at all levels of the information network: from hardware and software to file systems and databases, from user actions on a PC to their activity on the Internet. Web Security

Information Security (Infosec). What Is It? Principles, Standards.

Heimadal Security

Nowadays most information is stored digitally on a network, computer, server, or in the cloud, allowing criminals to easily obtain access to important information, therefore it is important to understand what information security is and its importance. What Is Information Security (InfoSec)? You might be wondering what information security is? The post Information Security (Infosec). appeared first on Heimdal Security Blog.

Information security vulnerability vs threat vs risk: What are the differences?

Security Boulevard

If organisations are to adequately protect their sensitive data, they need to understand the three core components of information security: threat, vulnerability and risk. What is an information security vulnerability? appeared first on Security Boulevard.

AusCERT and the Award for Information Security Excellence

Troy Hunt

At the gala dinner last night, without any warning beforehand, I somehow walked away with this: #AusCERT2018 Award for Information Security Excellence goes to @troyhunt @AusCERT 2018 Gala Dinner pic.twitter.com/9lxmwX0tdR — ValdemarJakobsen???? SecurityI've been at the AusCERT conference this week which has presented a rare opportunity to walk to a major event from my home rather than fly to the other side of the world.

Korea’s Top Information Security Companies Participate in RSA 2021

CyberSecurity Insiders

–(BUSINESS WIRE)–Korea Pavilion Participates in RSA 2021, the Largest IT Security Conference in the World. The post Korea’s Top Information Security Companies Participate in RSA 2021 appeared first on Cybersecurity Insiders SAN JOSE, Calif.–(BUSINESS

Becoming a new chief information security officer today: The steps for success

Zero Day

It's no easy ride -- but here are some tips from an experienced CISO

CISO 58

Appknox is Now Information Security Management System (ISO/IEC 27001:2013) Certified

Appknox

For Appknox, the privacy and security of user and business data have always been the topmost concern. Appknox Information Security ISO 27001 ISO/IEC 27000 CertificationAnd we have always tried to improve our risk management structure and constantly become better at what we do.

Demand More from Your Technology: The Future of Information Security With AI

Security Boulevard

The post Demand More from Your Technology: The Future of Information Security With AI appeared first on Security Boulevard. Security Bloggers NetworkThe traditional approach to preventing cyber-attacks has been to strengthen the perimeter in an effort to repel intruders.

From No Technical Experience to Information Security Analyst: Adrian Villegas’ Story

USD on Cyber Security

If you’re considering a career in cybersecurity but don’t have a technical background, you’ll want to meet Adrian Villegas, a recent graduate of our online Master of Science in Cyber Security Operations and Leadership program. Master of Science in Cyber Security

iCapital Network® Expands Data Security Leadership with Veteran Chief Information Security Officer

CyberSecurity Insiders

NEW YORK–(BUSINESS WIRE)–iCapital Network1, the global financial technology platform driving access and efficiency in alternative investing for the asset and wealth management industries, today announced Gary Owen will join iCapital as Chief Information Security Officer (CISO).

CISO 52

Influencer of the Year | Sounil Yu creates ‘must-have playbook in modern information security programs’

SC Magazine

Yu has contributed to cybersecurity models in his own right, having developed the Cyber Defense Matrix that was described by one tech leader as the “must-have playbook in modern information security programs.”

CISO 78

Introducing Behavioral Information Security

The Falcon's View

The focus of the boot camp was around "behavior design," which was suggested to me by a friend who's a leading expert in modern, progress security awareness program management. Suddenly, it occurred to me, "Hey, you know what we really need is a new sub-field that combines all aspects of security behavior design, such as security awareness, anti-phishing, social engineering, and even UEBA." I recently had the privilege of attending BJ Fogg's Behavior Design Boot Camp.

Casey’s General Stores Announces Security and Retail Leader Paul Suarez Joins Company as Chief Information Security Officer

CyberSecurity Insiders

NASDAQ: CASY), today announced that Paul Suarez has joined the company as chief information security officer. Suarez will report to Chief Information Officer Adrian Butler. ANKENY, Iowa–(BUSINESS WIRE)–Casey’s General Stores, Inc.

Your First Month as a CISO: Forming an Information Security Program

Dark Reading

It's easy to get overwhelmed in your new position, but these tips and resources will help you get started

An Action Plan to Fill the Information Security Workforce Gap

Dark Reading

Nothing says #whorunstheworld like an all-female blue team taking down a male-dominated red team in a battle to protect sensitive customer data, and other ideas to entice women into a cyber career

Author Q&A: In modern cyberwarfare ‘information security’ is one in the same with ‘national security’

The Last Watchdog

He coined the term ‘cyberwar,’ along with David Ronfeldt, over 20 years ago and is a leading expert on the threats posed by cyber technologies to national security. Information is weaponizable. These include stronger encryption, much more efficacious cloud security and some type of behavior-based cyber arms control agreement. Arquilla: Rethinking is necessary – redirection, too – because neither market mechanisms nor government policy have addressed the key security issues.

Obama Administration names first-ever federal Chief Information Security Officer

Tech Republic Security

The White House recently appointed retired Brigadier General Gregory J. Touhill as the US CISO, to bolster cybersecurity efforts in government

CISO 93

CISOs UNDER THE SPOTLIGHT: NEW REPORT FINDS THAT THE EXPECTATIONS OF CHIEF INFORMATION SECURITY OFFICERS HAVE NEVER BEEN GREATER

CyberSecurity Insiders

BT Security’s largest ever research project identifies the major trends that are changing the role of the CISO, and the worrying behaviors that show the need for a strategic response. Security CISO

CISO 52