This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
He has been calculated to be one of the top 3 cybersecurity influencers worldwide, and has written books ranging from Cybersecurity for Dummies to the official study guide from which many Chief Information Security Officers (CISOs) study for their certification exams.
“Sweet Security’s Cloud Native Detection and Response platform has been a game changer for us,” said Shai Sivan, CISO at Kaltura. Book a meeting with Sweet Security at AWS re:Invent 2024 in Las Vegas here. Sweet is on the frontlines of changing that by giving teams the cross-layer visibility they’ve needed for years.”
I’m delighted to announce the latest member of our growing CISO Advisor team, Pam Lindemeon. Pam is an exceptional leader; dedicated to advancing women in the IT industry, and I’m so glad she’s now joined Cisco to work closely with our community of CISOs and offer advice and guidance based on her incredible experience. Pam Lindemeon.
The post Strata Identity Releases “The Book” on Identity Orchestration for CISOs and Identity Architects appeared first on Security Boulevard. PRESS RELEASE Identity Orchestration For Dummies by tech visionary Eric Olden unlocks the secrets to multi-cloud identity management BOULDER, CO, Sep.
Do you have a corporate book club? Consider child-focused educational books, games, movies, or virtual events that can enroll adults along with their children on the topic of security education to make it a family affair. I’ve also been brought in to host Virtual Reading Events with the book for corporate programs.
He has led organizations within the cybersecurity industry for over 25 years, and has written books ranging from the best-selling Cybersecurity for Dummies to the official study guide from which many CISOs study for certification exams in advanced information security management. patent filings.
Steinberg has also been calculated to be one of the top 3 cybersecurity influencers worldwide, and has written books ranging from the best-selling Cybersecurity for Dummies (now in its second edition) to the official study guide from which many Chief Information Security Officers (CISOs) study for their certification exams.
Steinberg has also been calculated to be one of the top 3 cybersecurity influencers worldwide, and has written books ranging from the best-selling Cybersecurity for Dummies to the official study guide from which many Chief Information Security Officers (CISOs) study for their certification exams.
Todd Fitzgerald wrote the books on being a chief information security officer. Here he offers tips on what to do and what not to do in the first few months of a new CISO job.
AWS customers visiting AWS re:Invent 2024 in Las Vegas can book a meeting to learn more here. Founded by the IDF’s former CISO, Sweet’s solution focuses on the relationships between cloud infrastructure, workloads and applications , as well as network, and identity components.
In my latest book, The Super Smart Cyber Guide for Kids , I combine educational narrative, conversation starters and fun activities to inspire children, while offering a guided teaching tool to adults. I’ve also been brought in to host virtual reading events with the book for corporate and nonprofit efforts. About the essayist.
The assumption was that the person managing the corporate books was the most trustworthy person in […]… Read More. The post The Changing Role of the CISO appeared first on The State of Security. The post The Changing Role of the CISO appeared first on Security Boulevard.
The rise in personal liability for CISOs and executives (as seen in cases like the SolarWinds lawsuit) has increased focus on governance structures that provide clear oversight, accountability, and protection for decision-makers. Future governance frameworks must provide: Indemnification clauses to protect security leaders.
The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry. We must reduce barriers to entry.
Protecting assets across multiple locations, with multiple solutions from different vendors, has become a daily concern for CISOs globally. In a new e-book recently published (download here), CISOs with small security teams talk about the drivers for replacing their EDR/NGAV solutions with an Autonomous XDR solution and why they believe
For years, in articles, lectures, and books I have discussed how the spread of IoT and AI technologies – both individually and together – are dramatically increasing the danger to human life posed by cyberattacks on healthcare facilities.
A new book exposes yet another Facebook failure for the social media firm to say sorry about. But nothing’s going to change. The post Stalkers: ‘Ugly Truth’ of Facebook Staff Abusing Private Data appeared first on Security Boulevard.
The crux of the problem in present-day cybersecurity practice is summed up in this exchange from the book: After seven and a half million years of computing, “The answer to the Great Question of. “The Hitchhiker’s Guide to the Galaxy,” by Douglas Adams, could actually be a guide to cybersecurity if read in a different context.
Here are some of the positions where individuals can earn top-tier salaries: Chief Information Security Officer (CISO) – As the leader of an organization’s cybersecurity strategy, CISOs can earn well over $200,000 per year. High-Earning Cybersecurity Roles Certain roles in cybersecurity are highly lucrative.
This is how to redefine CISO events! Forget long boring sessions and tracks, this was about CISOs connecting at a social level, building relationships, and sharing insights. I had a spectacular time at the “Locked In — The Cybersecurity Event of the Year!” Organized by Rinki Sethi and Lucas Moody, it was nothing short of epic!
And the developers say this chip could end the "patch and pray" strategy that keeps security teams running in circles and lower the stress level of CISOs in the process. Pete Chronis, former CISO at Warner Media (HBO, Turner Broadcasting, etc.), was discussing his recent book about fixing cybersecurity.
In 1988 we had the Morris Worm , if you remember from the history books. So we’ve got to rethink things, and I think the Department of Defense and Department of Homeland Security and [Federal CISO] Chris DeRusha came out and reaffirmed a zero trust strategy, which I’ve been advocating for for the last five years. I lived it.
You Can’t Manage What You Can’t See Why Speed is Important to Asset Discovery In Summary Get a Demo Asset Discovery: A Must Have for Understanding Your Complete Attack Surface Justin Stouder, FireMon’s Asset Manager GM, met with a large financial services company a few years back, talking with the company’s CISO about their asset inventory.
“Your personal brand is powerful and works for you 24×7” Having built a strong personal brand and having taught CISOs, entrepreneurs and women-only groups how to do this, I’ve personally seen the impact it can have on them and the people with whom they interact. It’s helping me massively.
To End Eight years ago, in my book IN Security , I set out to solve the problem of the low numbers of women in cybersecurity. This blog isnt just a call to action; its a plea for reinvention. It’s something I discussed with Steve Prentice and Kate Barecchia on the Security Sessions Thales podcast last week.
Michael Gregg is the CISO for the State of North Dakota. In addition to his experience as a security practitioner, he has authored or co-authored more than 20 books, including Hack the Stack , Build Your Own Security Lab , and Security Administrator Street Smarts.
Mauro Israel is an avid poker player, having studied the game since he was a teenager and written several books on the topic. He also discusses his early days programming on a TRS-80, the moment he realized cybersecurity was a potential career path and how Yuval Noah Harari’s book Sapiens changed his life. ”).
A recovering CISO, with more than 30 years' experience of both cybersecurity leadership and client consulting mostly in healthcare, Richard has lived in more than 30 countries and delivered innovative solutions to organizations in all of them. Q : What are you going to do when you eventually retire? A : Not sure I ever will really.
He has led organizations within the cybersecurity industry for over two decades, has been calculated to be one of the top 3 cybersecurity influencers worldwide, and has written books ranging from Cybersecurity for Dummies to the official study guide from which many Chief Information Security Officers (CISOs) study for their certification exams.
With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security. The good news is that there is a very powerful, proven tool that can help companies decipher complex networking security relationships.
Simply taking a pause from email and social media in favor of a good book or conversation is known to increase your mood and life satisfaction. Before implementing any long-term security strategy, CISOs must first conduct a data sweep. Disconnecting from your mobile device, laptop or tablet can be as good as a holiday.
A certified information systems security management professional who has held major leadership roles in information security, he was the CISO at U.S. How each CISO builds credibility with the C-suite will vary — but it is crucial to do so. The CISO of the past won’t be the successful CISO of the future.
In an article for CISO Compass, CEO and CISO, Lee Parrish, deftly uses a colonoscopy metaphor to illustrate the difference between security and compliance. Parrish has published numerous articles and even written a children’s book on security, entitled, “Cyber Sam, The Alexander Connection.”
Recently, however, this has evolved to add a new responsibility: collaboration with the Chief Information Officer (CIO) and the Chief Information Security Officer (CISO). The Bottom Line Gone are the days that the CFO just ensures the books are balanced and the company’s floating weighted average cost of capital was decreasing.
Nowadays, organisations need digital leaders such as CIOs, CISOs, and CTOs who are strategists, visionaries, and know how to manage, effectively. Pre pandemic, Nominet released a study, Life Inside the Perimeter: Understanding the Modern CISO and reported on cybersecurity’s leaders. billion) is expected online.
In an article by mathematician Hannah Fry in the March 29, 2021 edition of The New Yorker, she reviews two new books on data and statistics. We collect and disseminate all manner of data, but not so much of data which count. The post Don’t Count on Cybersecurity Data appeared first on Security Boulevard.
By Sebastian Goodwin, CISO, Nutanix IT budgets and revenue growth areas are top of mind at the beginning of every calendar year, even more so with the current state of the world economy. IT departments and data teams are looking at the best ways to prioritize, maintain and build security measures – while being cost effective. He holds a B.S.,
It’s the first of the Four Agreements – a set of universal life principles outlined in the bestselling book by Don Miguel Ruiz. Next Steps Listen to the conversation Wolfgang Goerlich, Advisory CISO, and I had during this on-demand webinar entitled “The Skeptic and the Data: How to Build Trust for Zero Trust”.
Troia recently published a book called Hunting Cybercriminals, A Hacker's Guide to Online Intelligence Gathering Tools and Techniques. The book reveals secrets of The Dark Overlord and other hacking groups which Troia communicated with through various dark web aliases. Hunting for Cybercriminals can be risky business.
This episode features Matt Sharp, the CISO at LogicWorks, a leading provider of platform driven cloud operations for AWS and Azure. Matt is also an author and recently published The CISO Evolution. In this episode, Lisa and Matt discuss bridging the gap between security and business units, breaking down silos, and more!
This makes it hard for CISOs and their teams to gain a view of all digital certificates issued across the enterprise network. At scale, this creates a scenario where CISOs and their teams need to constantly monitor digital certificate lifespans to avoid expiration and potential downtime. Book a demo to see for yourself. [1]
If you’re a leader in cyber who values women, or a woman in cyber, who wants to improve your results (and are ready to invest), and you’d prefer to talk to me, book a discovery call and learn how my team and I can help you succeed. You’ll learn about the 7 Core Strengths needed to make women standard in cyber.
Aissi has received industry accolades for security innovation and leadership, including the 2019 and 2021 CISO of the Year Award and 2021’s Top 100 Global CISOs. He co-authored the book, “Security for Mobile Networks and Platforms” (Artech House). He is a Distinguished Fellow of the Ponemon Institute. About Blackhawk Network.
The information security industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts. Renee Tarun is the Deputy CISO and Vice President for Information Security at Fortinet Inc. Read the whole entry. »
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content