Remove InfoSec Remove Risk Remove Security Awareness Remove Technology
article thumbnail

Hi-5 With A CISO Dmitriy Sokolovskiy, Avid Technology

Security Boulevard

CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Dmitriy Sokolovskiy has been working in the cybersecurity space for over 14 years in dedicated security roles, in addition to 9 more years working in various IT areas.

CISO 59
article thumbnail

Security in software development

Notice Bored

The customer is apparently seeking guidance on integrating infosec into the development process, which begs the question "Which development process?". Reducing the problem to its fundamentals, there is a desire to end up with software/systems that are 'adequately secure', meaning no unacceptable information risks remain.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inflation Is Making Cybersecurity Even More Challenging for Leaders

SecureWorld News

Increased risk of cyberattacks The rising cost of living can lead to an increase in cybercrime, as people become more desperate to make money. Too many folks focus on the technology as opposed to the people or process. Investing in security awareness training has a bottom line impact.

article thumbnail

The discomfort zone

Notice Bored

I feel more confident about the underlying generic principles of risk, compliance, conformity, obligations, accountabilities, assurance and controls though, and have the breadth of work and life experience to appreciate the next point. The mind map is a brief glimpse of the landscape, as I see it. All requirements?! Documented! Maintained!

Risk 72
article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert.

article thumbnail

Cyber CEO – Cyber Hygiene is More Critical for Your Business Now Than Ever Before – Here’s Why

Herjavec Group

No matter how many firewalls or network controls you have in place, the risk of insider threat will always be present. So it should go without saying that enterprise security programs should be built with this in mind ! Implement the right tools, processes, and technology – based on the needs of your organization.

article thumbnail

The Quest for Optimal Security

The Falcon's View

There's no shortage of guidance available today about how to structure, build, and run a security program. Most guidance comes from a standpoint of inherent bias, whether it be to promote a product class, specific framework/standard, or to best align with specific technologies (legacy/traditional infrastructure, cloud, etc.).

InfoSec 40