Remove Architecture Remove CISO Remove Event
article thumbnail

From Pest Control to Cybersecurity: What CISOs Can Learn from Pestie

SecureWorld News

As I was spraying Pestiea DIY pest spray subscription servicearound my home this weekend (sun's out, spray gun's out), I was thinking about the correlation of this home perimeter defense to what CISOs and their teams do to keep their organizations secure. CISO takeaway: Effective cybersecurity isn't a generic solution.

CISO 110
article thumbnail

LW ROUNDTABLE:  Predictive analytics, full-stack visualization to solidify cyber defenses in 2025

The Last Watchdog

FIPS-203 enables legal PQC deployment, prompting CISOs to overhaul encryption strategies. Tipirneni Ratan Tipirneni , CEO, Tigera To maximize GenAI’s value, enterprises will customize models using proprietary data and Retrieval-Augmented Generation (RAG) architectures tailored to their specific needs.

Risk 173
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s It Like for a New CISO?

Lenny Zeltser

As of this writing, I’ve spent six months in the role of Chief Information Security Officer (CISO) at Axonius , a rapidly growing technology company. Our IT infrastructure is consistent zero-trust architecture principles , so it made sense to treat identity as the focal point of many security decisions.

CISO 84
article thumbnail

Let’s Talk Cybersecurity on the Agent of Influence Podcast

NetSpi Executives

Become the Influence A NetSPI podcast, Agent of Influence features experts in the cybersecurity field as they engage in conversation with Nabil Hannan, NetSPI Field CISO and podcast host, about the life and challenges as a leader in cybersecurity. Join Nabil Hannan, NetSPI Field CISO, on the Agent of Influence podcast.

article thumbnail

The Power of Relationships: Executive Buy-In and Security Culture for Bolstering Resilience

Cisco Security

” This is the question every CISO asks about every new program. It’s hard to imagine a more vital undertaking for CISOs. And as with all initiatives, CISOs always want to know where to begin. Experienced CISOs know that these factors can make or break security initiatives. “Where do we start?”

CISO 144
article thumbnail

The Bridge to Zero Trust

CyberSecurity Insiders

John Masserini, of Tag Cyber, will explore practical approaches to advancing zero trust along with his fellow panelists: Kevin Dana, VP of Information Technology for World Wide Technology; Marcos Christodonte II, Global CISO for CDW; and Allen Jeter, Director of IT for Chainalysis.

article thumbnail

BrandPost: 3 Best Practices for Building Security Resilience

CSO Magazine

Only 37% of organizations responding to a recent Cisco survey said they’re confident they can remain resilient in the event of a worst-case security incident. That’s not surprising, given the rapidly increasing volume of endpoints distributed across complex IT architectures. To read this article in full, please click here

CISO 82