This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Joe Sullivan, Uber’s CEO during their 2016databreach, is appealing his conviction. The government argued that Sullivan should have informed the FTC of the 2016 incident, but instead went out of his way to conceal it from them. “Despite the fact that Mr.
A jury yesterday found former Uber security chief Joe Sullivan guilty of covering up a massive databreach; the conviction makes Sullivan likely to become the first executive to face prison time over the mishandling of a cyberattack. Serving as a Chief Information Security Officer is a daunting task. Click To Tweet.
Databreaches can be quite a complicated issue for organizations. No matter how good, or bad, your cybersecurity is, sophisticated threat actors always seem to find a way to make life difficult for a CISO. T-Mobile databreach. The company disclosed the databreach quickly after discovering it.
Joe Sullivan, the former Chief Security Officer (CSO) of Uber, has been sentenced to three years’ imprisonment and 200 hours of community service for covering up a cyber attack on the company’s servers in 2016, which led to a databreach affecting over 50 million riders and drivers.
Marriott International has confirmed that it was victim to another databreach, its third since 2018, as an anonymous group of threat actors says it was able to successfully exfiltrate 20 GB of data, which includes credit card and other confidential information. The cause of the breach? Fool me twice, shame on me.
Truth, transparency and trust are the three T’s that all CISOs and CSOs should embrace as they march through their daily grind of keeping their enterprise and the data safe and secure. By way of background, Uber’s former CSO faces a five-felony count superseding indictment associated with his handling of the company's 2016databreach.
Department of Justice just filed federal charges against Uber's former Chief Security Offier (CSO) for allegedly covering up a company databreach and bribing hackers to stay silent about the attack. SecureWorld wrote about this case in Uber DataBreach: 3 Things Revealed in Testimony to Congress.
Yesterday, a federal jury handed down a guilty verdict to Joe Sullivan, the former CSO on charges of “obstruction of the proceedings of the Federal Trade Commission and misprision of felony in connection with the attempted cover-up of a 2016 hack at Uber” according to a notice published by the Department of Justice (DOJ).
In a case that ups the stakes for CSOs dealing with databreaches, former Uber chief security officer Joe Sullivan was found guilty by a federal jury earlier this week of obstructing justice and of misprision (concealing) of a felony in connection with his coverup of a 2016breach. United States Attorney Stephanie M.
This week, the former Chief Security Officer of Uber, Joseph Sullivan, was found guilty on one count of obstruction of justice and one count of misprison, the act of concealing a felony from authorities, arising out of his handling of a 2016databreach at the company. Sullivan's actions were irregular.
Since being promoted to his current role in January 2016, he has been responsible for directing Aflac’s global security strategy and leading the information security, business continuity and disaster recovery functions across the company, prioritizing security initiatives and allocating resources based on appropriate risk assessments.
The firings came as a result of a massive databreach which routed through an HVAC contractor’s compromised account. In 2016, Jay Leek – then CISO at the Blackstone investment firm, and now a CyberGRX board member — was collaborating with CSOs at several firms Blackstone had invested in when a common theme came up.
Once more unto the (data) breach! Caleb followed that with another startup, Bluebox, a mobile application security firm he sold to Lookout in 2016 , followed by senior roles as a Managing Vice President at CapitalOne and Vice President of Information Security at Databricks. Identity Fraud: The New Corporate Battleground.
According to the IBM Cost Per Breach Report for 2019, the average total databreach cost increased from $3.86M in 2018 to $4.24M in 2019. I had the displeasure of meeting a global hacker during a trip to Taiwan in 2016. Do these groups invest in cybersecurity by acquiring tools and talent similar to global organizations?
Everyone on the board is responsible and could potentially be held accountable for a breach both legally and financially. It is not only the CISO, CSO or CIO’s responsibility to care and do the right thing. Everyone is responsible and accountable. We all have a role to play to ensure the company is protected and set up for success.
23% of respondents say they do not currently have a CISO or security leader. ” A prior IBM Study on the cost of databreaches found, using a sample of 419 companies in 13 countries and regions, that 47% of databreach incidents in 2016 involved a malicious or criminal attack, 25% were due to negligent employees or contractors (i.e.,
reuse of passwords found in databreaches and phishing attacks. Future work Moving forward, I agree that the community would benefit from a more rigorous study with clear recommendations that can be used as a reference by CISOs, CTOs, policy makers, and other key opinion formers. and a web API called.
At times it can seem like a war of attrition, which brings us to the first series of predictions for 2020: CISOs will get worse at their jobs. With what we experienced in 2016 and 2018, is there any doubt there will be a rise in disinformation–homegrown and imported–of all stripe in the upcoming elections?
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content