2022 Workshop on Economics and Information Security (WEIS)

Schneier on Security

Uncategorized conferences security conferencesI did not attend WEIS this year , but Ross Anderson was there and liveblogged all the talks.

2020 Workshop on Economics of Information Security

Schneier on Security

The Workshop on Economics of Information Security will be online this year. Uncategorized conferences economics of securityRegister here.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Shortage of Information Security Professionals

Security Boulevard

The post Shortage of Information Security Professionals appeared first on Security Boulevard. Security Bloggers Network Social Engineering Cybersecurity General Infosec security professionals Shortage of Information Security Professionals social engineering

How Information Security Breaks The Classic IT Model

Security Boulevard

How Information Security Breaks The Classic IT Model. If the CEO requires a 20% reduction across the whole organization, reducing security only puts the company at risk for a breach that could make far more financially impactful than a drop in sales. Culture of Security.

Ukraine President enforces Information Security Strategy

CyberSecurity Insiders

Amid extreme concerns related to cyber warfare from Russia, Ukraine’s President Volodymyr Zelensky announced a new information security strategy policy was launched and came into effect early this week. News Ukraine INFORMATION SECURITY

The 2020 Workshop on Economics and Information Security (WEIS)

Schneier on Security

The workshop on Economics and Information Security is always an interesting conference. Uncategorized conferences economics of securityThis year, it will be online. Here’s the program. Registration is free.

Workshop on the Economics of Information Security

Schneier on Security

Last week, I hosted the eighteenth Workshop on the Economics of Information Security at Harvard. Ross Anderson liveblogged the talks. conferences economicsofsecurity securityconferences

How Information Security Teams Can Help Reduce Stress and Burnout

Dark Reading

Work across the organization and take practical steps to ease user stress — prioritize user productivity by offering the right tools to avoid shadow IT and cultivate a transparent security culture. Remember the security team, too, and automate as many processes as possible

Fixing the Shortage of Information Security Professionals

Security Boulevard

Using the Easy Button™ Last month, we posted our blog explaining the staffing shortage in the information security (InfoSec) industry. The post Fixing the Shortage of Information Security Professionals appeared first on Security Boulevard.

UK new information security commissioner is John Edwards

CyberSecurity Insiders

United Kingdom has issued a press update on the appointment of its next information commissioner and reports are because it is going to be John Edwards, who’s currently serving as Privacy Commissioner for New Zealand since 2014.

How to Keep Biometric Information Secure

Security Boulevard

With proper security strategies in place, biometric information can greatly enhance MFA and overall cybersecurity. The post How to Keep Biometric Information Secure appeared first on JumpCloud. Security Bloggers Network Multi-Factor Authentication (MFA) security

Sourcepass Names New Chief Information Security Officer

CyberSecurity Insiders

Ducsak as its new Chief Information Security Officer (CISO). In his new role, Ducsak will obtain and maintain compliance with data security regulations, certifications, and standards. For more information, please visit www.sourcepass.com.

On Opioids, Consultants and Information Security

Security Boulevard

The post On Opioids, Consultants and Information Security appeared first on Security Boulevard. Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Security Boulevard (Original) Spotlight Compliance data privacy law Information Security

Information Security Consultant – Job Description and How to Become

Security Boulevard

The post Information Security Consultant – Job Description and How to Become appeared first on Wallarm. The post Information Security Consultant – Job Description and How to Become appeared first on Security Boulevard. Security Bloggers Network Researcher Corner

Regulating a Nation’s Information Security Workforce

Security Boulevard

In a previous article, I examined Australia’s proposed Security Legislation Amendment (Critical Infrastructure) Bill 2020. The post Regulating a Nation’s Information Security Workforce appeared first on The State of Security.

The Guide to Presenting Information Security’s Business Value

Security Boulevard

When it comes to information security and stressing the importance of cyber risk management, getting the whole company (especially the C-suite) on the same playing field becomes paramount. Security Bloggers Network

How to implement mindful information security practices

Tech Republic Security

Mindfulness is all about being aware, so why not incorporate that in your cybersecurity practices

How to Build a Strong Information Security Policy

Security Boulevard

The post How to Build a Strong Information Security Policy appeared first on Hyperproof. The post How to Build a Strong Information Security Policy appeared first on Security Boulevard.

German Federal Office for Information Security (BSI) investigates Chinese mobile phones

Security Affairs

German Federal Office for Information Security is launching an investigation into the cybersecurity of certain Chinese mobile phones. The post German Federal Office for Information Security (BSI) investigates Chinese mobile phones appeared first on Security Affairs.

Keeping criminal justice information secure with advanced authentication

Security Boulevard

The post Keeping criminal justice information secure with advanced authentication appeared first on Entrust Blog. The post Keeping criminal justice information secure with advanced authentication appeared first on Security Boulevard.

Jason Ruger, Chief Information Security Officer | Lenovo

StaySafeOnline

The post Jason Ruger, Chief Information Security Officer | Lenovo appeared first on Stay Safe Online

Tinder achieves certification in Information Security Management System

CyberSecurity Insiders

Tinder, the most popular dating app among millennials has achieved for the first time a certification in Information Security Management System that endorses that the user data on the company servers remains well protected from all kinds of cyber threats.

Regulating a Nation’s Information Security Workforce

The State of Security

In a previous article, I examined Australia’s proposed Security Legislation Amendment (Critical Infrastructure) Bill 2020. The post Regulating a Nation’s Information Security Workforce appeared first on The State of Security.

Stacy Hughes joins Voya Financial as Chief Information Security Officer

CyberSecurity Insiders

NYSE: VOYA), announced today that Stacy Hughes has joined the company as senior vice president and chief information security officer (CISO). She will lead the effort to anticipate and proactively mitigate information security risks, while also supporting business growth and innovation.

Cybersecurity & information security resources I used in 2021

Security Boulevard

The post Cybersecurity & information security resources I used in 2021 appeared first on Security Boulevard. Security Bloggers Network Blog2021 was a year of learning and productivity, and 2022 will be no different. I have improved my Twitter thread that focused on cybersecurity learning resources. This list includes virtual labs, hands-on training, and the potential to earn certificates. This thread includes free & paid resources.

SAIC Appoints Kevin Brown as Chief Information Security Officer

Dark Reading

Industry leader with decades of information security experience manages SAIC’s security strategy and oversees critical cybersecurity operations

10 pioneering women in information security

CSO Magazine

So, it should come as no surprise that there are also many remarkable female pioneers in computer and information security. In the 1950s, women were calculating U.S. space missions, and by the 1960s they were programming mainframe computers.

CSO 83

Shaun Khalfan, Senior Vice President, Chief Information Security Officer | Discover Financial

StaySafeOnline

The post Shaun Khalfan, Senior Vice President, Chief Information Security Officer | Discover Financial appeared first on Stay Safe Online

Why would a lawyer ever need an Information Security Professional?

CyberSecurity Insiders

As an information security professional, have you often found yourself frustrated by the growing collection of cyber-based rules, guidance, regulations, and contemplations that our lawmakers can conjure up? That requires consultation with an information security professional.

All about Information Security Policies, and How to Draft them Effectively?

Security Boulevard

Complete guide on information security policies including what they are, why they're important, common mistakes when drafting. The post All about Information Security Policies, and How to Draft them Effectively? appeared first on Cyphere | Securing Your Cyber Sphere.

Leading Bangladeshi bank achieves new heights of information security with LogRhythm

Security Boulevard

The post Leading Bangladeshi bank achieves new heights of information security with LogRhythm appeared first on LogRhythm. The post Leading Bangladeshi bank achieves new heights of information security with LogRhythm appeared first on Security Boulevard.

(ISC)² Appoints Jon France, CISSP, as Chief Information Security Officer

Dark Reading

Accomplished cybersecurity leader will advocate globally for best practices in risk management and head up association security operations

AusCERT and the Award for Information Security Excellence

Troy Hunt

At the gala dinner last night, without any warning beforehand, I somehow walked away with this: #AusCERT2018 Award for Information Security Excellence goes to @troyhunt @AusCERT 2018 Gala Dinner pic.twitter.com/9lxmwX0tdR — ValdemarJakobsen???? SecurityI've been at the AusCERT conference this week which has presented a rare opportunity to walk to a major event from my home rather than fly to the other side of the world.

10 Tips for Maintaining Information Security During Layoffs

Dark Reading

Insider cyber threats are always an issue during layoffs -- but with record numbers of home office workers heading for the unemployment line, it's never been harder to maintain cybersecurity during offboarding

The Top 10 Highest Paying Jobs in Information Security – Part 1

The State of Security

According to Gartner, global spending on information security and risk management technology is expected to exceed $150 billion in 2021. The post The Top 10 Highest Paying Jobs in Information Security – Part 1 appeared first on The State of Security.

The Top 10 Highest Paying Jobs in Information Security – Part 2

The State of Security

Information security is an exciting and rapidly growing field for individuals who are interested in protecting users and their data. The post The Top 10 Highest Paying Jobs in Information Security – Part 2 appeared first on The State of Security.

BreachQuest Welcomes Sandy Dunn as Chief Information Security Officer

Dark Reading

Industry cybersecurity veteran joins executive team of leading cyber experts with key experience In healthcare market

BSidesSF 2020 – Sourya Biswas’ ‘How The Coasts Approach Information Security Differently’

Security Boulevard

The post BSidesSF 2020 – Sourya Biswas’ ‘How The Coasts Approach Information Security Differently’ appeared first on Security Boulevard. Events Security Bloggers Network BSidesSF 2020 Conferences Cyber Security education Information Security

Socure Names Security Veteran Chad Kalmes as Chief Information Security Officer

CyberSecurity Insiders

–( BUSINESS WIRE )–Today Socure , the leading provider of digital identity verification and fraud solutions, announced the hiring of Chad Kalmes as Chief Information Security Officer (CISO). INCLINE VILLAGE, Nev.–(

Cisco Duo Security Completes Australia’s Information Security Registered Assessors Program (IRAP) Assessment

Cisco CSR

The Australian Cyber Security Centre (ACSC) leads its government’s efforts to monitor threats and improve cyber security for individuals and families, small and medium businesses, major organizations and vital infrastructure, and government entities. Cisco Secure Social Channels.

NYU Tandon Launches Chief Information Security Officer Program

Dark Reading

Featuring in-depth core sessions and topical electives, the nine-month program takes a risk-based approach to cyber strategy

NTT Research Names Matthew Ireland Chief Information Security Officer

CyberSecurity Insiders

a division of NTT (TYO:9432), today announced that it has named Matthew Ireland Chief Information Security Officer (CISO). Most recently a consulting Practice Manager and Executive Security Strategist at NTT Ltd., SUNNYVALE, Calif.–(BUSINESS

CISO 52

Swiss Army Knife for Information Security: What Is Comprehensive Protection?

Threatpost

For example, the concept of SearchInform is to ensure control of threats at all levels of the information network: from hardware and software to file systems and databases, from user actions on a PC to their activity on the Internet. Web Security