Remove Accountability Remove CISO Remove Digital transformation
article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Gen AI threats and quantum computing exposures must be accounted for. Attacks targeting identities rose 71% last year, with valid accounts as the top entry point. Well see CISOs increasingly demand answers about why models flag certain malicious activity and how that activity is impactful at enterprise scale. The hard part?

article thumbnail

How CISOs Can Impact Security for All

Cisco Security

Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.

CISO 124
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passwordless Authentication without Secrets!

Thales Cloud Protection & Licensing

CISO and Operation Managers are increasingly attentive to the security and efficiency returns of frictionless onboarding and authentication for professionals working in dynamic, multi-user environments. Account recovery is traditionally highly vulnerable—a weak spot for the industry and a common vector for credential theft.

article thumbnail

Years overdue, the profile of the CISO begins to rise as cyber grabs attention in boardrooms

SC Magazine

Cybersecurity garnered far more attention in executive boardrooms and among regulators and insurance underwriters during the last couple years, thanks to both an increasing volume of attacks and growing demand for digital transformation. Our profile is certainly getting higher. Failure to communicate.

CISO 115
article thumbnail

New CISOs should focus more on people and less on tech, report finds

SC Magazine

Other major companies to recently install a new CISO include Uber and Square. Two major themes emerged from the research and interviews conducted with CISOs. The first is that developing human connections is more critical to a CISO’s early success than mastery of the technical details. Twitter headquarters.

CISO 99
article thumbnail

Cisco Secure Workload: Policy-as-Code Is a Win-Win for Everyone

Cisco Security

The last few years have proved to be a catalyst for digital transformation for many of our enterprise customers. Application modernization and adopting multicloud are the foundational building blocks for digitizing business. For more information on policy as code, contact your Cisco Account Team or Partner Account Manager.

article thumbnail

SHARED INTEL: Here’s why CEOs who’ve quit Tweeting are very smart to do so

The Last Watchdog

Related: How ‘credential stuffing’ enables online fraud As a result, some CEOs admit they’ve stopped Tweeting and deleted their LinkedIn and other social media accounts – anything to help reduce their organization’s exposure to cyber criminals. That’s the ‘cheat code’ for CISO success. Corporate inertia still looms large.

CISO 185