Remove Architecture Remove CSO Remove Insurance
article thumbnail

Spotlight on Cybersecurity Leaders: Glenn Kapetansky

SecureWorld News

For more than 20 years, Glenn has advised senior executives and built teams throughout the delivery cycle: strategy, architecture, development, quality assurance, deployment, operational support, financials, and project planning. Fun fact: my six years as CSO of Trexin is my first official full-time security role!

article thumbnail

Why do CISOs Keep Quitting on Florida?

SecureWorld News

In the last year, the state has seen a cyberattack take out the top regulatory agency, a data breach compromise the personal information of thousands of applicants for children’s health insurance, and a cyberattack that resulted in confidential information of 58,000 unemployment applicants being stolen, including SSNs and bank information.

CISO 98
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Theme of Cooperation Resounds at 10th Annual Denver Conference

SecureWorld News

As are government agencies, insurance companies, etc. Zero Trust architecture allows users full access only to the bare minimum they need to perform their jobs. panel featured reps from three vendors—Expel, Red Canary, and RSM US LLP—moderated by Jay Wilson, CISO of Insurity. It makes sense, least privilege, right?

CISO 96
article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Further, organisations will increasingly adopt zero-trust architectures to combat identity-based threats – which have just taken over endpoints as the primary attack vector, focusing on strict identity and access management (IAM) practices, passkeys, and enforcing multi-factor authentication (MFA).