This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast ( subscribe ). How CISOs need to adapt their mental models for cloud security [GCPblog] Who Does What In Cloud Threat Detection?
So some of you are thinking “ewwww … another security transformation paper” and this is understandable. A lot of people (and now … a lot of robots too) have written vague, hand-wavy “leadership” papers on how to transform security, include security into digitaltransformation or move to the cloud (now with GenAI!)
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast ( subscribe ). How CISOs need to adapt their mental models for cloud security” “Who Does What In Cloud Threat Detection?”
So some of you are thinking “ewwww … another security transformation paper” and this is understandable. A lot of people (and now … a lot of robots too) have written vague, hand-wavy “leadership” papers on how to transform security, include security into digitaltransformation or move to the cloud (now with GenAI!)
government is excelling with digitaltransformation (DX) which is critical in this time of crisis as the cloud becomes a crucial dynamic with the world working remotely. New digital capabilities are enabling data to be more fully utilized. As the U.S. Some good news: the U.S. Business continuity depends on it.
Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.
This blog has been authored by Frank Dickson, Program Vice President, Cybersecurity Products Practice, and Christopher Rodriguez, Research Director, IDC Network Security. IDC recently had the opportunity to talk to CISOs regarding the integration of Cisco Secure Workload and Secure Firewall.
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast ( subscribe ). How CISOs need to adapt their mental models for cloud security” “Who Does What In Cloud Threat Detection?”
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast ( subscribe ). How CISOs need to adapt their mental models for cloud security [GCPblog] Who Does What In Cloud Threat Detection?
Unfortunately, with every possibility a new security risk appears, and as a CISO you are well-aware of the implications. One of our recent blogs highlights tips to help with selecting and confirming trust in your third-party vendors, and this rings true now more than ever. What’s in that Big Data Lake?
you might be wondering how a CISO can prepare to face the authorities. As if lawyers and regulators weren’t enough, we are also dealing with the constant emphasis on digitaltransformation; the disappearance of the perimeter and decreasing visibility across our assets. If you worry about a data breach (and who doesn’t?),
We find many CISOs spend their time explaining what threats matter and why, as opposed to why cybersecurity matters in the first place,” he says. The biggest piece of advice I share with CISOs is to find ways to show how security protects the ways your firm generates revenue,” Forrester’s Pollard told me. I’ll keep watch.
Our annual Thales Data Threat Report-Federal Edition , released today, found that 98% of federal agencies are storing sensitive data within a digitallytransformative environment. The cloud, arguably not an “emerging” technology, has picked up more speed as a digitallytransformative environment for government agencies.
MFA awareness is not new to CISOs or IT teams. Many of these organizations are now undergoing digitaltransformation and are seeking ways to extend their PKI-based strong authentication frameworks to cloud and mobile use cases. And yet, according to Norton , data breaches for 2019 included 3,800 publicly disclosed breaches, 4.1
However, as technology has become more complex and pervasive, the CIO's role has expanded to encompass a broader range of responsibilities, including: Strategic IT leadership: CIOs are now expected to be strategic leaders, driving the organization's digitaltransformation agenda and aligning IT initiatives with business goals.
More than any other FinServ regulation, it includes unique components, such as the requirement for a Chief Information Security Officer (CISO) and an annual compliance certification. The regulation is incredibly stringent and sets an unusuallyalbeit necessarilyhigh bar for cybersecurity practices.
Top 10 Challenges Facing CISOs in 2023 – "While 2022 was certainly no walk in the park, strong cybersecurity investments and institutional support suggest a light at the end of the tunnel. As we turn toward 2023, these will be the top ten challenges facing CISOs in the new year.".
Seven Cloud Security Predictions CISOs Can Use in 2022. Since hybrid work models and digital business models are here to stay, IT and security teams will need to rethink how they can better protect data to prevent data breaches in the future. This compendium blog lists 70 , but the answer is surely higher now.
Also, “Accidental CISO” (AC), Chief Information Security Officer , who was just trying to get SOC2 and ISAC certifications for a vendor when he was abruptly named CISO of his organization. And finally, Christos Syngelakis, CISO, and Data Privacy Officer at Motor Oil Group. Find this blog helpful?
With over 1000 plus vendors going to great lengths to show their greatest over their competitors, the consuming enterprise CISO and CIO will continue to breach, data exfiltration, and ransomware. Cybersecurity has become a react, overreact, and under-react process, not a solution or strategy. Business relies on customers.
In today’s ever-changing world of digitaltransformation, organizations grapple with new challenges in keeping their day-to-day operations secure. A big part of the puzzle is the web browser, which according to Forrester, the typical enterprise worker spends 75% of their “device time” on.
Data protection and security can obviously cover a broad range of methods and integrations based on where the data is created and stored…not to mention the impact cloud and digitaltransformation have on an organization’s data protection strategy. 1: Developing a decision tree approach to security.
How should boards approach digital risks? Boards play a crucial role in governing digitaltransformation. Make digital risk a board-level responsibility Directors should integrate AI governance, cybersecurity, and data protection into corporate strategy.
“At this year’s Conference 46 percent of all keynote speakers were women,” according to Sandra Toms, VP and curator, RSA Conference, in a blog she posted on the last day of this year’s event. Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017.
In this Spotlight edition of the podcast, sponsored* by RSA Security, we go deep on public sector cyber risk with two interviews from the most recent RSA Conference: Kelvin Coleman, the Executive Director of the National Cyber Security Alliance (NCSA) and Sean McHenry, the CISO of the Utah State Board of Education. Read the whole entry. »
Last August, my colleague Ashvin Kamaraju wrote a blog shortly after this took place. This creates a complex web of rules and regulations that a CISO needs to navigate to protect their company. Where is a CISO to begin? On June 28, 2018 the governor of California Jerry Brown signed into law with Assembly Bill No.
As the global CISO of Mediapro, Roberto has deployed Cisco SecureX together with Umbrella, Secure Endpoint, Secure Firewall, ISE, NGIP, Threat Response, AnyConnect, and Web security. In the end, this has resulted not only in a digitaltransformation, but a business transformation. Luigi Vassallo.
Defenses in 2020 The rapid shift to remote work this year propelled digitaltransformation, cloud adoption, and securing it all with zero trust principles. As one CISO shared with me, “Our crisis response and subsequent focus on securing productivity pushed new initiatives to 2021.” Well, it was. But then it wasn’t.
In last year’s Cybersecurity Conversations Report , we discussed what the massive digitaltransformation resulting from 2020 meant for enterprise cybersecurity. CISOs and infosec professionals are finally getting a seat at the table at an executive and board level. Welcome to 2022! COVID” Testing Your Devices. ?
Nabil Hannan Field CISO “We’re still facing a deficit of cybersecurity professionals globally. Teams must keep pace with digitaltransformation to ensure cloud security. In 2024, IT teams will look to turn this around and keep pace with the technical skills needed to secure digitaltransformations.
Relying on the kindness of strangers is not an ideal strategy for CISOs and CIOs. To even begin to craft a cybersecurity strategy to manage partners and a global supply chain, the enterprise CISO needs to have a candid understanding of what their partners’ security level truly is.
This year, we’ve written about what the future holds in terms digitaltransformations and new and exciting technologies. We’ve also addressed what key executives, especially CISOs, should be thinking about as data moves and is accessed across their organizations. Now, we turn our attention to best practices for data security.
This event is focused on the needs of senior IT and security professionals, such as CISOs, chief risk officers, architects, IAM and network security leaders. I was just reviewing last year’s trip report and thinking about how it was full of “IoT”, “Blockchain”, and of course “DigitalTransformation”.
CEOs, Boards of Directors, CIOs, CTOs, and CISOs do not tolerate a world where the identities of their customers, workforce, or business partners (ie: human identity) are not secure because that means identity cannot be counted on to safely allow or deny access. There was a time when digitaltransformation was happening in data centers.
Jason is the Vice President of Business Application Cybersecurity at Onapsis and a former CISO at fashion design firm Fossil Group. How DigitalTransformation is forcing GRC to evolve. To understand a bit more, we invited Jason Fruge into the Security Ledger studios. That publication accompanies patches issued by Oracle.
This blog was written by Wayne Anderson, previous Enterprise Security Architect at McAfee. Yet most of these same leaders assert that security is being brought in too late to enable digitaltransformation initiatives! We need to remember that, as customer journeys are the way that digitaltransformation shows up.
Encryption Shane Tully | Global CISO, A24 More About This Author > The Payment Card Industry Data Security Standard ( PCI-DSS ) v4.0 The challenges were multi-faceted: Deliver a digitaltransformation of their business and customer experience. For example, consider the European Digital Operational Resilience Act (DORA).
More than any other FinServ regulation, it includes unique components, such as the requirement for a Chief Information Security Officer (CISO) and an annual compliance certification. The regulation is incredibly stringent and sets an unusuallyalbeit necessarilyhigh bar for cybersecurity practices.
Expert Insights Recognition Were thrilled to be recognized by tech review platform Expert Insights in their shortlist of leading B2B tech software for CISOs and IT managers. They were recognized for their unique ability to protect customers critical applications, APIs, and data anywhere, at scale, and with the highest ROI.
And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy. 6 - State CISOs on the frontlines of AI security As the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies.
Hero mentality Senior security leaders, i.e. CSOs and CISOs, need to be able to convey the risks that their teams face, especially to board members who can easily get lost in explanations of the endless technical nuances. Digitaltransformation affecting security. It’s like they’ve got Harry Potter’s invisibility cloak.
Amazingly, Medium has fixed the stats so my blog/podcast quarterly is back to life. As before , this covers both Anton on Security and my posts from Google Cloud blog , and our Cloud Security Podcast ( subscribe ). How CISOs need to adapt their mental models for cloud security [GCPblog] Who Does What In Cloud Threat Detection?
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content