Ukraine President enforces Information Security Strategy

CyberSecurity Insiders

Amid extreme concerns related to cyber warfare from Russia, Ukraine’s President Volodymyr Zelensky announced a new information security strategy policy was launched and came into effect early this week. News Ukraine INFORMATION SECURITY

Getting Started With Threat-Informed Security Programs

Dark Reading

Security leaders need to examine their business model, document risks, and develop a strategic plan to address those risks

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

2020 Workshop on Economics of Information Security

Schneier on Security

The Workshop on Economics of Information Security will be online this year. Uncategorized conferences economics of securityRegister here.

(ISC)² Appoints Jon France, CISSP, as Chief Information Security Officer

Dark Reading

Accomplished cybersecurity leader will advocate globally for best practices in risk management and head up association security operations

UK new information security commissioner is John Edwards

CyberSecurity Insiders

United Kingdom has issued a press update on the appointment of its next information commissioner and reports are because it is going to be John Edwards, who’s currently serving as Privacy Commissioner for New Zealand since 2014.

The 2020 Workshop on Economics and Information Security (WEIS)

Schneier on Security

The workshop on Economics and Information Security is always an interesting conference. Uncategorized conferences economics of securityThis year, it will be online. Here’s the program. Registration is free.

On Opioids, Consultants and Information Security

Security Boulevard

The post On Opioids, Consultants and Information Security appeared first on Security Boulevard. Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Security Boulevard (Original) Spotlight Compliance data privacy law Information Security

Workshop on the Economics of Information Security

Schneier on Security

Last week, I hosted the eighteenth Workshop on the Economics of Information Security at Harvard. Ross Anderson liveblogged the talks. conferences economicsofsecurity securityconferences

SAIC Appoints Kevin Brown as Chief Information Security Officer

Dark Reading

Industry leader with decades of information security experience manages SAIC’s security strategy and oversees critical cybersecurity operations

10 pioneering women in information security

CSO Magazine

So, it should come as no surprise that there are also many remarkable female pioneers in computer and information security. In the 1950s, women were calculating U.S. space missions, and by the 1960s they were programming mainframe computers.

Jason Ruger, Chief Information Security Officer | Lenovo

StaySafeOnline

The post Jason Ruger, Chief Information Security Officer | Lenovo appeared first on Stay Safe Online

German Federal Office for Information Security (BSI) investigates Chinese mobile phones

Security Affairs

German Federal Office for Information Security is launching an investigation into the cybersecurity of certain Chinese mobile phones. The post German Federal Office for Information Security (BSI) investigates Chinese mobile phones appeared first on Security Affairs.

The Guide to Presenting Information Security’s Business Value

Security Boulevard

When it comes to information security and stressing the importance of cyber risk management, getting the whole company (especially the C-suite) on the same playing field becomes paramount. Security Bloggers Network

How to Build a Strong Information Security Policy

Security Boulevard

The post How to Build a Strong Information Security Policy appeared first on Hyperproof. The post How to Build a Strong Information Security Policy appeared first on Security Boulevard.

Keeping criminal justice information secure with advanced authentication

Security Boulevard

The post Keeping criminal justice information secure with advanced authentication appeared first on Entrust Blog. The post Keeping criminal justice information secure with advanced authentication appeared first on Security Boulevard.

How to implement mindful information security practices

Tech Republic Security

Mindfulness is all about being aware, so why not incorporate that in your cybersecurity practices

Tinder achieves certification in Information Security Management System

CyberSecurity Insiders

Tinder, the most popular dating app among millennials has achieved for the first time a certification in Information Security Management System that endorses that the user data on the company servers remains well protected from all kinds of cyber threats.

10 Tips for Maintaining Information Security During Layoffs

Dark Reading

Insider cyber threats are always an issue during layoffs -- but with record numbers of home office workers heading for the unemployment line, it's never been harder to maintain cybersecurity during offboarding

Why would a lawyer ever need an Information Security Professional?

CyberSecurity Insiders

As an information security professional, have you often found yourself frustrated by the growing collection of cyber-based rules, guidance, regulations, and contemplations that our lawmakers can conjure up? That requires consultation with an information security professional.

The Executive Women's Forum on Information Security, Risk Management & Privacy Elects Three Board Advisers

Dark Reading

Security executives hail from Target, Eli Lilley, and SecurityCurve/SaltCybersecurity

The Top 10 Highest Paying Jobs in Information Security – Part 1

The State of Security

According to Gartner, global spending on information security and risk management technology is expected to exceed $150 billion in 2021. The post The Top 10 Highest Paying Jobs in Information Security – Part 1 appeared first on The State of Security.

The Top 10 Highest Paying Jobs in Information Security – Part 2

The State of Security

Information security is an exciting and rapidly growing field for individuals who are interested in protecting users and their data. The post The Top 10 Highest Paying Jobs in Information Security – Part 2 appeared first on The State of Security.

Assigning impact and likelihood values in an asset-based information security risk assessment

Security Boulevard

Organisations that are looking to improve their information security posture are probably familiar with ISO 27001. Just as importantly, it helps organisations understand their information security priorities.

AusCERT and the Award for Information Security Excellence

Troy Hunt

At the gala dinner last night, without any warning beforehand, I somehow walked away with this: #AusCERT2018 Award for Information Security Excellence goes to @troyhunt @AusCERT 2018 Gala Dinner pic.twitter.com/9lxmwX0tdR — ValdemarJakobsen???? SecurityI've been at the AusCERT conference this week which has presented a rare opportunity to walk to a major event from my home rather than fly to the other side of the world.

Getting started with a career in Cyber Security and Information Security

Doctor Chaos

The Information Security Profession – Where do I Start? I am often asked by individuals to provide advice or guidance on how to get started in the field of information security. Many college students tell me they want to be a hacker, an IT systems penetration tester, or other type of cyber security professional. Cyber InfoSec education infosec security awareness tools training

BSidesSF 2020 – Sourya Biswas’ ‘How The Coasts Approach Information Security Differently’

Security Boulevard

The post BSidesSF 2020 – Sourya Biswas’ ‘How The Coasts Approach Information Security Differently’ appeared first on Security Boulevard. Events Security Bloggers Network BSidesSF 2020 Conferences Cyber Security education Information Security

The Executive Women's Forum on Information Security, Risk Management & Privacy Presents the Leadership Scholarship

Dark Reading

Scholarship's goal is to advance women in cybersecurity, risk, and privacy

Web vulnerability classes in the context of information security certifications

Acunetix

For certifications such as CISSP, CISA, Security+, CASP+, or CySA+, web vulnerability classes make up only a small part of the knowledge required to pass the exam. The post Web vulnerability classes in the context of information security certifications appeared first on Acunetix.

NTT Research Names Matthew Ireland Chief Information Security Officer

CyberSecurity Insiders

a division of NTT (TYO:9432), today announced that it has named Matthew Ireland Chief Information Security Officer (CISO). Most recently a consulting Practice Manager and Executive Security Strategist at NTT Ltd., SUNNYVALE, Calif.–(BUSINESS

CISO 52

Swiss Army Knife for Information Security: What Is Comprehensive Protection?

Threatpost

For example, the concept of SearchInform is to ensure control of threats at all levels of the information network: from hardware and software to file systems and databases, from user actions on a PC to their activity on the Internet. Web Security

Information Security Policy: Overview, Key Elements and Best Practices

SecurityTrails

Understand the importance of an information security policy for a modern organization, what one IT security policy should contain and a few best practices. enterprise security

What Is Residual Risk in Information Security?

Heimadal Security

The post What Is Residual Risk in Information Security? appeared first on Heimdal Security Blog.

Topic-specific policy 6/11: information security incident management

Notice Bored

I'm intrigued by the title of this topic-specific policy from the [draft] 3rd edition of ISO/IEC 27002 , being the only one of eleven example titles in the standard that explicitly states "information security".

5 Ways artificial intelligence Is Being Used to Keep Sensitive Information Secure

Security Affairs

Artificial intelligence is an immensely helpful tool for businesses and consumers alike, how to use artificial intelligence to secure sensitive Information. By processing data quickly and predicting analytics, AI can do everything from automating systems to protecting information.

Information security vulnerability vs threat vs risk: What are the differences?

Security Boulevard

If organisations are to adequately protect their sensitive data, they need to understand the three core components of information security: threat, vulnerability and risk. What is an information security vulnerability? appeared first on Security Boulevard.

Blackhawk Network Expands Security and Technology Team with Addition of Selim Aissi as New Chief Information Security Officer

CyberSecurity Insiders

–( BUSINESS WIRE )– Blackhawk Network , a global financial technology company and a leader in payment technologies and solutions, today announced veteran information security executive, Selim Aissi, has been named its Chief Information Security Officer.

CISO 52

Jane Harper, Senior Director of Information Security Risk Management and Business Engagement | Eli Lilly

StaySafeOnline

The post Jane Harper, Senior Director of Information Security Risk Management and Business Engagement | Eli Lilly appeared first on Stay Safe Online

Information Security (Infosec). What Is It? Principles, Standards.

Heimadal Security

Nowadays most information is stored digitally on a network, computer, server, or in the cloud, allowing criminals to easily obtain access to important information, therefore it is important to understand what information security is and its importance. What Is Information Security (InfoSec)? You might be wondering what information security is? The post Information Security (Infosec). appeared first on Heimdal Security Blog.

DEF CON 29 Voting Village – Sang Oun Lee’s ‘Keeping Your Information Security Policy Up To Date’

Security Boulevard

The post DEF CON 29 Voting Village – Sang Oun Lee’s ‘Keeping Your Information Security Policy Up To Date’ appeared first on Security Boulevard. Network Security Security Bloggers Network cybersecurity education DEF CON DEF CON 29 education Election Security Hardware Security Information Security Infosec Education security Voting Village

Korea’s Top Information Security Companies Participate in RSA 2021

CyberSecurity Insiders

–(BUSINESS WIRE)–Korea Pavilion Participates in RSA 2021, the Largest IT Security Conference in the World. The post Korea’s Top Information Security Companies Participate in RSA 2021 appeared first on Cybersecurity Insiders SAN JOSE, Calif.–(BUSINESS

From No Technical Experience to Information Security Analyst: Adrian Villegas’ Story

USD on Cyber Security

If you’re considering a career in cybersecurity but don’t have a technical background, you’ll want to meet Adrian Villegas, a recent graduate of our online Master of Science in Cyber Security Operations and Leadership program. Master of Science in Cyber Security

Demand More from Your Technology: The Future of Information Security With AI

Security Boulevard

The post Demand More from Your Technology: The Future of Information Security With AI appeared first on Security Boulevard. Security Bloggers NetworkThe traditional approach to preventing cyber-attacks has been to strengthen the perimeter in an effort to repel intruders.

ISO/IEC 27002's overall and topic-specific information security policies 0/11

Notice Bored

of the forthcoming new 3rd edition of ISO/IEC 27002 recommends two complementary types of information security policies. Topic-specific policies are typically structured to address the needs of certain target groups within an organization or to cover certain security areas.