This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. Many CISOs are already burnt out, and there is shortage of qualified CISOs globally.
In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance. As the rules were authorized in late 2023, we shared what we see as the implications for infosec leaders. Exposure management can help meet the SEC requirements So what can a CISO do about this?
We hear it all the time: there are not enough people to fill all the cybersecurity roles (including CISOs) that are currently available, not to mention the openings expected in the coming months and years. Being a CISO sometimes serves as the catalyst to finding a new career path.". People want: Work-life balance.
The policies are written in the application language and give appropriate controls to developers to write their requirements into the application while the NetSec team ensures full compliance to the infosec policies dictated by the CISO organization. We’d love to hear what you think. Cisco Secure Social Channels.
In this episode, we discuss the SEC’s charges against SolarWinds’ CISO for misleading investors about a major cyberattack. The post SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service appeared first on Security Boulevard.
Designate a qualified individual (CISO or equivalent) responsible or overseeing and implementing a cybersecurity program and enforcing its cybersecurity policy. Require the CISO to provide a written report at least annually to the board or equivalent governing body. Have Infosec certifications and passion for #cyber and #dataprivacy.
Security Posture suggests a confusing mix of application and account security metrics. A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.
But infosec thought leaders say that blaming an intern ignores the true roots of the problem, including insufficient credentials policies and access management practices – as evidenced in part by the simplicity of the password itself: “solarwinds123”. Infosec experts similarly chided the company for a lack of strong credentials.
We covered the new rules on July 31, with some thoughts from InfoSec leaders. Sam Masiello , CISO at The Anschutz Corporation, had this to say back in July: "I would expect that many CISOs today are feeling as if their job just got harder and now has a brighter spotlight shining specifically on them.
Additionally, there sectoral privacy regulations in the United States, such as the Health Insurance Portability and Accountability Act (HIPAA), and state level regulations like the California Consumer Privacy Act (CCPA). The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs.
That was the case for a broadcast SecureWorld recently hosted with Mike Britton, CISO of Abnormal Security , and legendary investigative journalist Brian Krebs. In these types of collaborative platforms, like Slack for example, when some user account credentials get phished, someone else's credentials could be phished.
Consider, if you will, that fundamentally we in infosec want people to make better decisions. However, when people are empowered to make their own decisions and are held accountable for the lasting impacting , then and only then will they start adopting more of a caretaker mentality and start considering long-term impacts.
Distractions and diversions are all too frequently stealing time away from security awareness professionals, forcing them to tend to non-critical tasks while setting aside their core responsibilities of developing a strong internal infosec culture. Brian Johnson, chief security officer at Armorblox, and former CISO at LendingClub.
I think it requires taking a step back and assessing what you can do with less," said Chris Roberts, CISO and Senior Director at Boom Supersonic. Andrew Smeaton, CISO at Afiniti, says reassessment of cybersecurity programs and plans is necessary. Too many folks focus on the technology as opposed to the people or process.
If or when more attacks are uncovered, end-user organizations will need to apply the lessons learned from SolarWinds and prepare to take swift and decisive action, infosec experts agreed in a series of interviews with SC Media.
Randy is a CISSP and is active in the Central Missouri InfoSec community. Answer: Effective, cross-platform and easy-to-implement password-less authentication with regular assessment of account/system behavior to enforce expected behavior and identify anomalous actions. Get to know Randy Raw.
Equally, direct messages have been used by groups to take control over influencer accounts to promote messaging of their own. We live in a world where we are governed by rules, territories, and jurisdictions; to hold a threat actor accountable, we would need digital evidence. Who Can Regulate? By Christiaan Beek. Who Can Regulate?
I feel more confident about the underlying generic principles of risk, compliance, conformity, obligations, accountabilities, assurance and controls though, and have the breadth of work and life experience to appreciate the next point. The possibility of being held personally to account (perhaps even sacked or prosecuted!)
According to the Harvard Business Review , though, companies with at least $200 million in cyber insurance account for a bit more than 20% of what is believed to be $5 billion in global cyber insurance premium, amounting to roughly $1.1 billion in premium. That’s quite the incentive for insurers to assert themselves in this market.
As organisations work to improve their ability to manage information risk, the importance of having a Chief Information Security Officer (CISO) is also being recognised. The person in this role needs to be part of board room discussions to successfully implement organisational change.
Now, CISO is a run of the mill job fraught with stress and responsibility and likely to burn and churn or give you an ulcer." If the morning paper had a misplaced character, it was noticed and you were held accountable, most likely, but the paper didn't shut down, didn't lose money or go out of business," Staynings continued. "If
First and foremost, your security program must account for basic security hygiene, which creates the basis for arguing legal defensibility ; which is to say, if you're not doing the basics, then your program can be construed insufficient, exposing your organization to legal liability (a growing concern). Behavioral InfoSec. The Basics.
Ransomware has become one of the most dangerous and high-profile problems facing CIOs and CISOs worldwide. Zero Trust assumes there is no implicit trust granted to assets, user accounts, microservices, or data based solely on their location. Hims Pawar. Oct 27, 2021. A recent U.S. government in the first six months of 2021. .
Infosec is a largely non-technical field. For example, every CISO needs to have an automated script that will cause all the alarms in their home (and mobile) to go off when an SSH CVE happens. Sensitive servers need to have canary accounts that will trigger alarms if they ever get compromised. Transparency is good.
We constantly see new threats, and threat vectors, come and go; which puts a tremendous strain on the InfoSec teams that have to protect organizations and businesses from these threats. Cyber Observer’s partnership with Cisco enables CISOs to manage and monitor their cybersecurity eco-system posture. Read more here.
Every aspect of human life is influenced and changed by machines — from visiting the doctor, to purchasing online, to accessing bank accounts, to flying on an airplane. Developers want to go incredibly fast and infosec wants to be secure even if it slows down development. Mon, 10/10/2022 - 08:15. Software is rapidly eating the world.
Better Reporting and the Path to Accountability. Convert those objectives into measurable items, and there you are on the path to KPIs as policies. For more on thoughts on security metrics, I recommend checking out the CIS Benchmarks as a starting point.
This month, we interviewed Esmond Kane, CISO of Steward Health Care. First of all, while I am honoured and deeply thankful for the recognition, I believe strongly that Security is a team effort and I must acknowledge the superb InfoSec team in Steward but also the Steward workforce. Esmond Kane is Cisco’s CISO of the month.
Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. Christine Bejerasco, CISO of WithSecure , expands that “in the physical dimension, poisoning the well could impact communities in the area.
Dd (Catharina) Budiharto is the founder of Cyber Point Advisory LLC, a fractional CISO firm providing cybersecurity advisory services to small and mid-size businesses (SMBs). She was a CISO for several Oil and Gas companies and was a past chairperson for the American Petroleum Institute (API) IT Security Sub-Committee.
Vamos i I realized this isn't the typical InfoSec opening for The Hacker Mind but it is an important backstory for this episode's guest. Vamos i maturity accounts for some of that. I've always respected you know, in the cyber field, there's a healthy partnership or Brotherhood or sisterhood among CISOs. Nobody stand back.
Defining “storytelling” in an InfoSec context Inspiration - We the People: Democratizing Security “Storytelling” is a word that you will hear frequently within Duo’s creative team — now part of a Brand & Strategy unit for Cisco’s rebranded security organization Cisco Secure. But where to begin?
Tyler Farrar, CISO, Exabeam. Doing so provides the necessary context needed to restore trust and react in real time to protect user accounts — halting malicious access in its tracks.”. Infosec will dominate our lives in the tech space for the foreseeable future. Steve Moore, chief security strategist, Exabeam.
Where we are today exposes the gaps in our armour – we have failed on many accounts. It’s too easy to follow, it’s too easy to be part of the echo chamber of infosec. On the eve of 2023 it’s time for a collective commitment to the planet and the infosec community. Please try to save the planet as it’s the only one we have.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content