Remove Accountability Remove CSO Remove Risk
article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Unisys, for instance, was found to have framed cyber risks hypothetically even though its systems had already been breached, exfiltrating gigabytes of data. But the SEC’s latest actions underscore that failing to inform stakeholders about material risks and breaches is not an option. Addressing this root cause must be a priority.

CISO 263
article thumbnail

GUEST ESSAY: Leveraging ‘zero trust’ and ‘remote access’ strategies to mitigate ransomware risks

The Last Watchdog

Let’s walk through some practical steps organizations can take today, implementing zero trust and remote access strategies to help reduce ransomware risks: •Obvious, but difficult – get end users to stop clicking unknown links and visiting random websites that they know little about, an educational challenge. Best practices.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Inactive accounts pose significant account takeover security risks

CSO Magazine

Inactive and non-maintained accounts pose significant security risks to users and businesses, with cybercriminals adept at using information stolen from forgotten or otherwise non-upheld accounts to exploit active accounts. To read this article in full, please click here

article thumbnail

IT asset disposal is a security risk CISOs need to take seriously

CSO Magazine

Lack of a program signals data may be at risk when equipment is recycled; presence of a program signals attention to data protection. Sign up for CSO newsletters. ]. Sign up for CSO newsletters. ]. Learn 12 tips for effectively presenting cybersecurity to the board and 6 steps for building a robust incident response plan.

CISO 116
article thumbnail

GAO report faults CIOs, OMB for slow adoption of cybersecurity recommendations

CSO Magazine

The US General Accountability Office (GAO) issued the 19-page report , “Cybersecurity and Information Technology: Federal Agencies need to Strengthen Efforts to Address High-Risk Areas” on July 29. Sign up for CSO newsletters. ]. Both pointed out shortcomings in the cyber readiness of the United States government.

CSO 142
article thumbnail

GAO calls out US government agencies: Get your supply chain security act together

CSO Magazine

In December 2020, the US Government Accounting Office (GAO) made 145 recommendations to 23 federal agencies relating to supply chain risks. D’Souza, testified before Congress on supply chain risks. Get the latest from CSO by signing up for our newsletters. ]. Get the latest from CSO by signing up for our newsletters. ].

article thumbnail

Secrets to building a healthy CISO-vendor partnership

CSO Magazine

Conversely, one that is problematic and incohesive can have the opposite effect, negatively impacting a company’s security practices and leaving them vulnerable to risks and wasted investment. A well-oiled relationship built on trust, communication and mutual understanding can reap significant benefits for a business’s cybersecurity posture.

CISO 128