article thumbnail

The Presenting Vendor Paradox

Daniel Miessler

This presenter is just talking their own book! Many conference schedules, however, are full of talks from people who work at vendors. Conversely, people in the crowd at these conferences often have two complaints about the content. There isn’t enough good content, or. They sell service!

article thumbnail

CISO’s Guide to Presenting Cybersecurity to Board Directors

CyberSecurity Insiders

To ensure cybersecurity becomes a strategic part of the corporate culture, it is crucial for CISOs to present the topic in a clear, concise, and compelling manner. Board members are not necessarily experts in cybersecurity, so it is important to present information in a way that is easily digestible and resonates with them.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

(ISC)² Security Congress 2023 Begins Call for Presentations

CyberSecurity Insiders

ISC)² today launched its call for presentations for its annual (ISC)² Security Congress event, taking place live in Nashville, Tennessee on October 25-27, 2023 at the Gaylord Opryland Resort and Convention Center and also online. (ISC)² To submit a presentation proposal, visit the (ISC)² Security Congress call for presentations portal.

article thumbnail

I Actually Like Remote and Pre-recorded Presentations

Daniel Miessler

I think people who love presenting live are actually in love with presenting as much or more than what they’re presenting. That’s not shade because I also enjoy giving and attending live presentations. But unlike John, I don’t see the studio version of presentations as inferior to the live versions.

InfoSec 229
article thumbnail

Nearly half of enterprise endpoint devices present significant security risks

Tech Republic Security

The post Nearly half of enterprise endpoint devices present significant security risks appeared first on TechRepublic. Organizations are struggling to manage devices and stay ahead of vulnerabilities, patches and attacks, according to a new report from Adaptiva and the Ponemon Institute.

Risk 187
article thumbnail

Book Review: Present Future — Business, Science and the Deep Tech Revolution

Lohrman on Security

Guy Perelmuter offers an insightful, easy to read, helpful guide to present and future technology in business areas ranging from the future of jobs to AI and from cryptocurrencies to quantum computing.

article thumbnail

Software Supply Chain Attacks: Clear and Present Danger

Security Boulevard

The post Software Supply Chain Attacks: Clear and Present Danger appeared first on Security Boulevard. In a study conducted by Argon Security at Aqua Security, it was found that the majority of companies didn’t implement software supply chain security measures and that most organizations are still at risk. “Unfortunately, most.

Software 144