2020 Workshop on Economics of Information Security

Schneier on Security

The Workshop on Economics of Information Security will be online this year. Uncategorized conferences economics of securityRegister here.

The 2020 Workshop on Economics and Information Security (WEIS)

Schneier on Security

The workshop on Economics and Information Security is always an interesting conference. Uncategorized conferences economics of securityThis year, it will be online. Here’s the program. Registration is free.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

10 pioneering women in information security

CSO Magazine

So, it should come as no surprise that there are also many remarkable female pioneers in computer and information security. In the 1950s, women were calculating U.S. space missions, and by the 1960s they were programming mainframe computers.

On Opioids, Consultants and Information Security

Security Boulevard

The post On Opioids, Consultants and Information Security appeared first on Security Boulevard. Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Security Boulevard (Original) Spotlight Compliance data privacy law Information Security

Jason Ruger, Chief Information Security Officer | Lenovo

StaySafeOnline

The post Jason Ruger, Chief Information Security Officer | Lenovo appeared first on Stay Safe Online

Workshop on the Economics of Information Security

Schneier on Security

Last week, I hosted the eighteenth Workshop on the Economics of Information Security at Harvard. Ross Anderson liveblogged the talks. conferences economicsofsecurity securityconferences

How to implement mindful information security practices

Tech Republic Security

Mindfulness is all about being aware, so why not incorporate that in your cybersecurity practices

The Guide to Presenting Information Security’s Business Value

Security Boulevard

When it comes to information security and stressing the importance of cyber risk management, getting the whole company (especially the C-suite) on the same playing field becomes paramount. Security Bloggers Network

Tinder achieves certification in Information Security Management System

CyberSecurity Insiders

Tinder, the most popular dating app among millennials has achieved for the first time a certification in Information Security Management System that endorses that the user data on the company servers remains well protected from all kinds of cyber threats.

Information Security (Infosec). What Is It? Principles, Standards.

Heimadal Security

Nowadays most information is stored digitally on a network, computer, server, or in the cloud, allowing criminals to easily obtain access to important information, therefore it is important to understand what information security is and its importance. What Is Information Security (InfoSec)? You might be wondering what information security is? The post Information Security (Infosec). appeared first on Heimdal Security Blog.

Why would a lawyer ever need an Information Security Professional?

CyberSecurity Insiders

As an information security professional, have you often found yourself frustrated by the growing collection of cyber-based rules, guidance, regulations, and contemplations that our lawmakers can conjure up? That requires consultation with an information security professional.

NTT Research Names Matthew Ireland Chief Information Security Officer

CyberSecurity Insiders

a division of NTT (TYO:9432), today announced that it has named Matthew Ireland Chief Information Security Officer (CISO). Most recently a consulting Practice Manager and Executive Security Strategist at NTT Ltd., SUNNYVALE, Calif.–(BUSINESS

CISO 52

BSidesSF 2020 – Sourya Biswas’ ‘How The Coasts Approach Information Security Differently’

Security Boulevard

The post BSidesSF 2020 – Sourya Biswas’ ‘How The Coasts Approach Information Security Differently’ appeared first on Security Boulevard. Events Security Bloggers Network BSidesSF 2020 Conferences Cyber Security education Information Security

What Is Residual Risk in Information Security?

Heimadal Security

The post What Is Residual Risk in Information Security? appeared first on Heimdal Security Blog.

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Many college students tell me they want to be a hacker, an IT systems penetration tester, or other type of cyber security professional. Cyber InfoSec education infosec security awareness tools training

10 Tips for Maintaining Information Security During Layoffs

Dark Reading

Insider cyber threats are always an issue during layoffs -- but with record numbers of home office workers heading for the unemployment line, it's never been harder to maintain cybersecurity during offboarding

AusCERT and the Award for Information Security Excellence

Troy Hunt

At the gala dinner last night, without any warning beforehand, I somehow walked away with this: #AusCERT2018 Award for Information Security Excellence goes to @troyhunt @AusCERT 2018 Gala Dinner pic.twitter.com/9lxmwX0tdR — ValdemarJakobsen???? SecurityI've been at the AusCERT conference this week which has presented a rare opportunity to walk to a major event from my home rather than fly to the other side of the world.

From No Technical Experience to Information Security Analyst: Adrian Villegas’ Story

USD on Cyber Security

If you’re considering a career in cybersecurity but don’t have a technical background, you’ll want to meet Adrian Villegas, a recent graduate of our online Master of Science in Cyber Security Operations and Leadership program. Master of Science in Cyber Security

Information security vulnerability vs threat vs risk: What are the differences?

Security Boulevard

If organisations are to adequately protect their sensitive data, they need to understand the three core components of information security: threat, vulnerability and risk. What is an information security vulnerability? appeared first on Security Boulevard.

Korea’s Top Information Security Companies Participate in RSA 2021

CyberSecurity Insiders

–(BUSINESS WIRE)–Korea Pavilion Participates in RSA 2021, the Largest IT Security Conference in the World. The post Korea’s Top Information Security Companies Participate in RSA 2021 appeared first on Cybersecurity Insiders SAN JOSE, Calif.–(BUSINESS

Swiss Army Knife for Information Security: What Is Comprehensive Protection?

Threatpost

For example, the concept of SearchInform is to ensure control of threats at all levels of the information network: from hardware and software to file systems and databases, from user actions on a PC to their activity on the Internet. Web Security

Appknox is Now Information Security Management System (ISO/IEC 27001:2013) Certified

Appknox

For Appknox, the privacy and security of user and business data have always been the topmost concern. Appknox Information Security ISO 27001 ISO/IEC 27000 CertificationAnd we have always tried to improve our risk management structure and constantly become better at what we do.

Demand More from Your Technology: The Future of Information Security With AI

Security Boulevard

The post Demand More from Your Technology: The Future of Information Security With AI appeared first on Security Boulevard. Security Bloggers NetworkThe traditional approach to preventing cyber-attacks has been to strengthen the perimeter in an effort to repel intruders.

iCapital Network® Expands Data Security Leadership with Veteran Chief Information Security Officer

CyberSecurity Insiders

NEW YORK–(BUSINESS WIRE)–iCapital Network1, the global financial technology platform driving access and efficiency in alternative investing for the asset and wealth management industries, today announced Gary Owen will join iCapital as Chief Information Security Officer (CISO).

CISO 52

5 Ways artificial intelligence Is Being Used to Keep Sensitive Information Secure

Security Affairs

Artificial intelligence is an immensely helpful tool for businesses and consumers alike, how to use artificial intelligence to secure sensitive Information. By processing data quickly and predicting analytics, AI can do everything from automating systems to protecting information.

Introducing Behavioral Information Security

The Falcon's View

The focus of the boot camp was around "behavior design," which was suggested to me by a friend who's a leading expert in modern, progress security awareness program management. Suddenly, it occurred to me, "Hey, you know what we really need is a new sub-field that combines all aspects of security behavior design, such as security awareness, anti-phishing, social engineering, and even UEBA." I recently had the privilege of attending BJ Fogg's Behavior Design Boot Camp.

Casey’s General Stores Announces Security and Retail Leader Paul Suarez Joins Company as Chief Information Security Officer

CyberSecurity Insiders

NASDAQ: CASY), today announced that Paul Suarez has joined the company as chief information security officer. Suarez will report to Chief Information Officer Adrian Butler. ANKENY, Iowa–(BUSINESS WIRE)–Casey’s General Stores, Inc.

Influencer of the Year | Sounil Yu creates ‘must-have playbook in modern information security programs’

SC Magazine

Yu has contributed to cybersecurity models in his own right, having developed the Cyber Defense Matrix that was described by one tech leader as the “must-have playbook in modern information security programs.”

CISO 53

CISOs UNDER THE SPOTLIGHT: NEW REPORT FINDS THAT THE EXPECTATIONS OF CHIEF INFORMATION SECURITY OFFICERS HAVE NEVER BEEN GREATER

CyberSecurity Insiders

BT Security’s largest ever research project identifies the major trends that are changing the role of the CISO, and the worrying behaviors that show the need for a strategic response. Security CISO

CISO 52

Keysight’s Automotive Cybersecurity Test System Selected by Eastern Michigan University’s School of Information Security & Applied Computing

CyberSecurity Insiders

NYSE: KEYS), a leading technology company that delivers advanced design and validation solutions to help accelerate innovation to connect and secure the world, and Eastern Michigan University’s (EMU) School of Information Security & Applied Computing, announced that EMU has selected Keysight’s Automotive Cybersecurity Penetration Test System to support the next generation of cybersecurity engineers and researchers studying at the EMU GameAbove College of Engineering and Technology.

Your First Month as a CISO: Forming an Information Security Program

Dark Reading

It's easy to get overwhelmed in your new position, but these tips and resources will help you get started

An Action Plan to Fill the Information Security Workforce Gap

Dark Reading

Nothing says #whorunstheworld like an all-female blue team taking down a male-dominated red team in a battle to protect sensitive customer data, and other ideas to entice women into a cyber career

2019 Predictions: Information security will be given a seat at the table without asking

Thales Cloud Protection & Licensing

Many years ago, a board member said to me, “We’ve employed you to do information security, so why do we have to do anything?” My experience in the past has been that information/cyber security professionals have often been relegated to giving advice on the threat landscape and risks, and then futilely lobbying the board for visibility and resources to put appropriate controls in place. Data security

Obama Administration names first-ever federal Chief Information Security Officer

Tech Republic Security

The White House recently appointed retired Brigadier General Gregory J. Touhill as the US CISO, to bolster cybersecurity efforts in government

CISO 67

NIST's Cybersecurity Framework offers small businesses a vital information security toolset

Tech Republic Security

Small businesses run lean, and bad guys know that means security may be less than adequate. NIST researchers share ways that small businesses can protect their information

Obama creates new Federal Chief Information Security Officer Post

Tech Republic Security

President Obama announced Thursday the creation of a new federal CISO position. Find out who was appointed and what they'll be doing

CISO 60

The Strategic Corporal and Information Security

Digital Shadows

The post The Strategic Corporal and Information Security first appeared on Digital Shadows. For those unfamiliar with the term “strategic corporal”, it sprung out of the conflicts in Afghanistan and Iraq. The concept. Threat Intelligence Strategic Corporal

The Presenting Vendor Paradox

Daniel Miessler

There’s a paradox in information security where the community wants two things at once: High quality research and talks, and. Information Security

Putin proposes new information security collaboration to US, including no-hack pact for election

Security Affairs

Putin is proposing a new cyber security collaboration with the United States, including a no-hack pact for the upcoming Presidential election. A special responsibility for its prevention lies on the key players in the field of ensuring international information security (IIS).”

Five Common Pitfalls in Application Protection

Security Boulevard

As DevOps are gaining more influence on security related decisions, the information security staff has to do more than block attacks. The post Five Common Pitfalls in Application Protection appeared first on Security Boulevard.

CISO 113

Threat actors leaked data stolen from EA, including FIFA code

Security Affairs

Motherboard, who was among the first sites to report the security breach, contacted EA which confirmed the data breach. The company said that hackers did not access player data, it also added to have already implemented additional security measures.

Dead Drops and Security Through Obscurity

Daniel Miessler

There’s massive confusion in the security community around Security Through Obscurity. There are two pieces to a good security system. The security mechanism. The security key. What about other types of security system? Information Security

More evidence suggests that DarkSide and BlackMatter are the same group

Security Affairs

The post More evidence suggests that DarkSide and BlackMatter are the same group appeared first on Security Affairs. Researchers found evidence that the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation.