Remove Information Security Remove InfoSec Remove Technology Remove Workshop
article thumbnail

CISO workshop slides

Notice Bored

Zero-trust - whatever that means to the presenter and audience; Cloud - meaning Azure, specifically; DevOps and DevSecOps - whatever those terms mean ; MS threat intelligence including artificial intelligence/machine learning rapid responses to novel malware (a cool idea, provided it works reliably).

CISO 63
article thumbnail

Herjavec Group Wins 4 Cyber Defense Magazine Global InfoSec Awards

Herjavec Group

Market Leader in Managed Security Service Provider (MSSP). HG Managed Security Services can be consumed independently or packaged into a complete Security-as-a-Service offering. HG Security Engineering . HG Mana ged Detection & Response (MDR) . Identity Managed Services. .

InfoSec 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The discomfort zone

Notice Bored

That's a heady mix of laws and regs that apply to the organisation, its officers and workers, its property and finances, its technologies, its contracts, agreements and relationships with employees and third parties including the authorities, owners, suppliers, partners, prospects and customers, and society at large. Documented! Maintained!

Risk 72
article thumbnail

Security pros rely on peer groups and open communication for help with stress

SC Magazine

This nonstop barrage of security crises has made certain infosec leaders and practitioners more aware than ever of the job’s impact on mental healthy, and the importance to protect against stress, exhaustion and burnout. But how have they been managing? But you don’t have to be a member of a formal group.

InfoSec 113
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.

Hacking 40
article thumbnail

The Hacker Mind Podcast: Hacking Diversity

ForAllSecure

You’d think that having an amazing resume, a couple of bug bounties, or a CTF win would land you that dream infosec job. Welcome to the hacker mind and original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. There's a serious shortage of InfoSec professionals.

Hacking 40
article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

For example, outcomes like adapting to external events, creating a security culture, and cost-effective programs, all improve when organizations make progress towards zero trust security (based on survey responses from 4,751 active information security and privacy professionals from 26 countries).