Remove 2010 Remove CISO Remove Risk
article thumbnail

Ghost Ransomware a Persistent Global Threat to Critical Infrastructure

SecureWorld News

Tim Mackey, Head of Software Supply Chain Risk Strategy at Black Duck, explains: "Attacks on legacy cyber-physical, IoT, and IIoT devicesparticularly in an OT environmentare to be expected and must be planned for as part of the operational requirements for the device. For the latest updates and resources, visit StopRansomware.gov.

article thumbnail

The Resurgence of Zero Trust: Why it’s Essential for CISOs and CIOs to Include in Their Strategy

CyberSecurity Insiders

History of Zero Trust Its widely accepted that the concept of zero trust was first introduced by John Kindervag, a former Forrester Research analyst, in 2010. Importance for CISOs and CIOs Zero trust is no longer just a buzzword for CISOs and CIOs.

CISO 87
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Spotlight on Cybersecurity Leaders: Imran Ahmad

SecureWorld News

I happened to "pick" cybersecurity as an area of specialization based on a conversation with my wife in 2010 while driving from Toronto to Montreal. Cyber risk is dynamic and ever changing. Get to know Imran Ahmad Q : Why did you decide to pursue cybersecurity as a career path? A : It was entirely by accident.

article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

Cedric Leighton is founder and president of Cedric Leighton Associates, a strategic risk and leadership management consultancy. He retired as a colonel in 2010. Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. She is also the host of the Mastering Cyber podcast.

article thumbnail

How to build a cyber capable board

Security Boulevard

In just a few years, cyber has transformed from the nerd in the corner into the Kim Kardashian of risk. businesses can be built on, and destroyed by, cyber risk. Then give them clear guidance on how quickly you want these addressed and what level of risk you can live with. 2 Talk to your CISO. 1 Lead from the front.

article thumbnail

Fact check: Quantum computing may transform cybersecurity eventually – but not yet

SC Magazine

I’m not talking about a [quantum computer] that JP Morgan can buy to do their own trading analysis or credit risk analysis, I’m talking about the sheer power to do code breaking,” Cheng said. “I By purchasing and implementing early, you risk using algorithms that are not the ones that end up being standardized.

article thumbnail

7 Trends I Spotted When Reviewing 2020 and the Cybersecurity Skills Gap

Jane Frankland

But according to a report by PWC, over half (56%) of the leaders they surveyed believed their organisations were at risk due to cybersecurity staff shortages. Leadership is the secret sauce for cyber risk reduction This year has called for remarkable leadership as the pandemic has taken a toll on those in the industry.