Remove state-of-security why-a-ciso-needs-to-speak-the-language-of-business
article thumbnail

Security Experts Assess 2.0 Draft of NIST Cybersecurity Framework

SecureWorld News

Michael Gregg, CISO, State of North Dakota: " One of the things that most excites me about the new framework is the addition of the 'govern' function. Michael Gregg, CISO, State of North Dakota: " One of the things that most excites me about the new framework is the addition of the 'govern' function. 19, Detroit on Sept.

article thumbnail

Top 10 Quotes About Cloud Security

SecureWorld News

Are you looking for relevant quotes about security in the cloud to help frame your thoughts or frame a discussion on the topic? We are happy to pass along top cloud security quotes from SecureWorld regional security conferences and digital platforms, like our webcasts and podcasts. Top 10 quotes about cloud security.

Backups 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

She talks about the various ways criminal hackers hide their work, what happens after ransomware hits on a system, how investigators go about looking for recovery information, and what type of skills those practitioners need t o succeed. That’s when there became an urgent need for computer forensics to become a discrete science.

article thumbnail

Years overdue, the profile of the CISO begins to rise as cyber grabs attention in boardrooms

SC Magazine

Executives from security company Kaspersky speak at a global partner conference about information security is a key business success factor – a reality that is starting to shine a brighter spotlight on security chiefs. Ian Gavan/Getty Images for Kaspersky Lab ). But that may be changing – somewhat.

CISO 115
article thumbnail

7 Trends I Spotted When Reviewing 2020 and the Cybersecurity Skills Gap

Jane Frankland

It’s been a challenging year with the global Covid-19 pandemic bringing both good and bad outcomes in business. Along with working from home, redundancies, furloughed workers, reduced hours, uncertainties around future employment, technology replacing jobs and business closures, we’ve seen much needed resets and innovations.

article thumbnail

Buyer’s Guide for Evaluating Cyber Threat Exposure Management (CTEM) Tools

NopSec

At this stage, you’ve probably realized that your vulnerability assessment scanner isn’t cutting it in terms of helping reduce security workload or making a meaningful impact in reducing your risk exposure. Fear not, all Security teams make this realization on the journey toward cybersecurity maturity.