Remove Architecture Remove CISO Remove Government
article thumbnail

MY TAKE: As network perimeters shift and ecosystems blend, the role of MSSPs solidifies

The Last Watchdog

I had the chance to discuss this with Shinichi Yokohama, NTT Global CISO and John Petrie, Counselor to the NTT Global CISO, at RSA Conference 2023. Towards zero-trust So how should CISOs steer their organizations? the architecture must come first, and then they can decide which product choices they would prefer.”

CISO 244
article thumbnail

The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips

Cisco Security

On the heels of President Biden’s Executive Order on Cybersecurity (EO 14028) , the Office of Management and Budget (OMB) has released a memorandum addressing the heads of executive departments and agencies that “sets forth a Federal zero trust architecture (ZTA) strategy.” In other words, one size does not fit all.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

LW ROUNDTABLE: Cybersecurity takeaways of 2023 — and what’s ahead in 2024 ( part 3)

The Last Watchdog

Rebecca Krauthamer , Co-founder and CPO, QuSecure Krauthamer As new standards for quantum-resilient cryptography come into effect, many government agencies will move toward quantum-readiness. CISOs will have to get quantum resilient encryption on their cyber roadmap.

article thumbnail

Why do CISOs Keep Quitting on Florida?

SecureWorld News

Chief Information Security Officers (CISO) have the luxury of being an incredibly hot commodity, so they can pretty much pick and choose where they work, as they are almost guaranteed to have a job waiting for them somewhere. Cybersecurity concerns in Florida State Government. Cybersecurity officials struggle in Florida.

CISO 98
article thumbnail

GUEST ESSAY: 5 tips for ‘de-risking’ work scenarios that require accessing personal data

The Last Watchdog

Related: The dangers of normalizing encryption for government use. Planning required processes and security components when initially building your architecture. Working with personal data in today’s cyber threat landscape is inherently risky. This can include: Security contours. Helping ensure data privacy. Unique IDs.

Risk 240
article thumbnail

People Skills Outweigh Technical Prowess in the Best Security Leaders

SecureWorld News

Michael Gregg, the CISO for the State of North Dakota, speaks across the country, including keynoting at SecureWorld Detroit on Sep. His common sense approach to cybersecurity has made North Dakota a leader among state and local governments with unique challenges as public entities. 19 and at SecureWorld Dallas on Oct.

CISO 107
article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

Now we’re just CERT, we’ve grown beyond computer emergency response and within SEI, we do have three big things for not only DoD, our principal sponsor but across government and industry. One, we work to modernize software development and acquisition, because code is fueling society. I’m absolutely thrilled. I think it’s a strength.

CISO 109