This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Responses edited for clarity and length: Ambuj Kumar , CEO, Simbian Kumar While the SEC has fined the corporations, CISOs are worried that they may be held individually responsible and feel targeted by both attackers and now law enforcement. Some have moved away from the CISO role. Addressing this root cause must be a priority.
Effective partnerships between CISOs and their cybersecurity vendors are integral to security success. He notes that CISOs often have a select group of key security vendors that have become trusted partners where the relationship is mutually beneficial. To read this article in full, please click here
Asset disposal normally isn’t one of those burning topics that is top-of-mind for CISOs, yet every CISO must be able to address it when asked to describe their information technology asset disposal (ITAD) program. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ].
The role of a Chief Information Security Officer (CISO) is undeniably complex, yet incredibly rewarding. However, the challenges faced by CISOs are mounting, exacerbated by the evolving threat landscape and regulatory environment. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.
In a LinkedIn post today, June 26th, Jamil Farshchi, EVP and CISO at Equifax, had this to say about the news: "This is a really big deal. It's unprecedented: this is likely the first time a CISO has ever received one of these. So it seems odd for a CISO to get one of these," he wrote. federal securities laws."
But a closer inspection of the facts is critical, and should temper sky-is-falling concerns that personal liability of CISOs is the new norm. RELATED: Data Breach Cover-Up: Uber's Former CSO Faces up to 8 Years Behind Bars ]. Sullivan's conviction should not be an existential crisis for CISOs and security professionals.
and its Chief CISO, Timothy G. Internal Accounting and Disclosure Controls: The SEC's allegations that SolarWinds failed to maintain effective internal accounting and disclosure controls were also dismissed. Accountability at the executive level is essential for fostering a culture of security and compliance.
Most recently, one of those new schemes involves fake LinkedIn profiles representing Chief Information Security Officers (CISOs) at some of the world's largest corporations. CISO profiles spoofed on LinkedIn. One of the fake profiles that was discovered was for one Victor Sites, claiming to be the CISO at Chevron.
We hear it all the time: there are not enough people to fill all the cybersecurity roles (including CISOs) that are currently available, not to mention the openings expected in the coming months and years. Being a CISO sometimes serves as the catalyst to finding a new career path.". People want: Work-life balance.
Proofpoint today released its annual report titled, "2023 Voice of the CISO: Global insights into CISO challenges, expectations and priorities," in which it surveyed 1,600 CISOs sharing their experiences over the past year and their outlook for what is to come for the cybersecurity industry. That's changing.
In a move that has raised concerns about the company's cybersecurity posture, Amy Bogac, Clorox's CISO, has stepped down from her position. For CISOs, the 'C' in the title designates a considerable degree of responsibility for material business value.
This has happened as the cybercrime cartels have evolved beyond wire transfer frauds to target market strategies, take over brokerage accounts, and island-hop into banks, according to the report.
Sam Masiello , CISO at The Anschutz Corporation, had this to say back in July: "I would expect that many CISOs today are feeling as if their job just got harder and now has a brighter spotlight shining specifically on them. I would think that boards would want to have that experience, even though it is somewhat difficult to come by.
Organizations have long struggled with whether and when to designate a Chief Privacy Officer to their ranks, where that role should sit (in compliance, legal, or other department), and who the CPO or privacy official should report to and be accountable for," said Myriah Jaworski Esq., RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.
Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. To ensure cybersecurity becomes a strategic part of the corporate culture, it is crucial for CISOs to present the topic in a clear, concise, and compelling manner.
No matter how good, or bad, your cybersecurity is, sophisticated threat actors always seem to find a way to make life difficult for a CISO. Last year, T-Mobile investigated a post made on an underground forum that claimed 100 million user accounts had been compromised in a data breach. T-Mobile data breach.
Our Controls Framework was maybe the most important investment of it all," Jamil Farshchi, CISO at Equifax, said in a recent LinkedIn post. Farshchi was brought in by Equifax in February 2018 as EVP and CISO to help clean up the company's cybersecurity posture and damaged reputation. into our security transformation. It's interactive.
In addition, this data will be distributed across a complex multi-cloud landscape of locations, accounts and applications. 2 - CISOs will turn to multi-cloud security platforms When it comes to the cloud, enterprises are increasingly wary of putting all their eggs in one basket.
.” “It would be possible, on detailed examination of video, to compromise elements of operational security,” agreed Mike Hamilton, co-founder and chief information security officer of CI Security and former Seattle CISO. Thought leaders advise reducing or eliminating the use of these skeleton key-like accounts.
Plus, a PwC study says increased collaboration between CISOs and fellow CxOs boosts cyber resilience. Those are the three major vectors that organizations must take into account in order to properly assess a cloud workload’s risk level and potential vulnerability impact.
It helps give me and the teams priorities, it gives alignment between the teams, and we get the tracking and accountability,” says Gregg, who was named the state’s CISO in late 2021 after working in the position as an interim and prior to that as director of state cyber operations. To read this article in full, please click here
Under the guidance of Dan Meacham, VP of Global Security and Corporate Operations and CSO/CISO, the multi-billion dollar organization transitioned from on-premises data centers to the cloud in 2012. MVISION CNAPP helps me keep my system administrators and developers accountable for what they are doing. Learn more.
Everyone in the company and on the board should be responsible and accountable for good cybersecurity practices. In July 2020, we saw key high-profile Twitter accounts compromised. Everyone is responsible and accountable. It is not only the CISO, CSO or CIO’s responsibility to care and do the right thing.
For instance, Winick cited a 2017 New York Post article that suggested credit rating company Equifax had blamed its software vendor for a major breach, “thus violating another crisis communications commandment of ‘Be accountable.’”
Unraveling the True Security Risks ” (SecurityWeek) “ How deepfakes threaten biometric security controls ” (TechTarget) “ Deepfakes break through as business threat ” (CSO) 3 - Fake update variants dominate list of top malware in Q3 Hackers are doubling down on fake software-update attacks.
said Dan Meacham, vice president of global security and corporate operations and CSO/CISO at film production company Legendary Entertainment. Being introduced to the account manager as well… is very helpful to us to really understand what the personalities are,” he added. Moreover, a list of references can be very useful.
And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy. 6 - State CISOs on the frontlines of AI security As the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies. national security.
Encourage your key cyber professionals to develop first-rate security awareness training materials for employees and executive staff. In the event of the Ransomware assault, the G Suite administrator will receive a notification about the incident either via e-mail or by Slack.
” Still, Exabeam CISO Tyler Ferrar told eSecurity Planet by email that he’s hopeful the rules will benefit consumers too by encouraging better security. “This added layer of accountability can thus create a safer environment for consumers’ personal information.”
“Kerberoasting” and “Golden Ticket” attacks were both introduced in 2014 and yet enterprises continue to have hundreds of accounts configured with unconstrained delegation. Richard Bird , CSO, Traceable AI Bird The bad guys are showing no restraint in exploiting API security weakness to their advantage.
These challenges include bias and discrimination embedded in algorithms, privacy violations due to enhanced surveillance capabilities, and the difficulty of assigning accountability for decisions made by AI systems. Useful resources include: The Professional Association of CISOs at [link].
At Forter, we’ve seen a marked uptick in Account Takeovers (ATO); a form of identity fraud in which a third-party steals credentials and / or gains access to user accounts. Fraudsters have been opportunistic in taking over these accounts. Tyler Farrar ,CISO, Exabeam. Wes Spencer, VP, External CSO, ConnectWise.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content