This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
He has led organizations within the cybersecurity industry for over 25 years, and has written books ranging from the best-selling Cybersecurity for Dummies to the official study guide from which many CISOs study for certification exams in advanced information security management. patent filings.
The rise in personal liability for CISOs and executives (as seen in cases like the SolarWinds lawsuit) has increased focus on governance structures that provide clear oversight, accountability, and protection for decision-makers. Future governance frameworks must provide: Indemnification clauses to protect security leaders.
Related: Preparing for ‘quantum’ hacks That being so, a new book, Fixing American Cybersecurity , could be a long overdue stake in the ground. Part one of the book catalogues how cyber criminals and US adversaries have taken full advantage of systemic flaws in how we’ve come to defend business and government networks.
Most decision-makers focus solely on mitigating relentless cyberrisks, seeing gender inclusion as secondary or irrelevant to “urgent” challenges. To End Eight years ago, in my book IN Security , I set out to solve the problem of the low numbers of women in cybersecurity.
Nowadays, organisations need digital leaders such as CIOs, CISOs, and CTOs who are strategists, visionaries, and know how to manage, effectively. The pressure for those in charge is immense as cyberrisks have scaled, and can now bring businesses, economies, and communities to a halt. billion) is expected online.
These legislations mandate cyberrisk and gap assessment, deployment of OT Security Operations Center (SOC), better reporting and asset visibility and enhanced monitoring of OT/ICS networks. Learn more about an IEC 62443-base cyber threat and risk assessment for your infrastructure. Penalties are in order as well.
The information security industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts. Renee Tarun is the Deputy CISO and Vice President for Information Security at Fortinet Inc. Read the whole entry. »
Creeping cyberrisk grabbing global headlines Ransomware keeps reminding us of the strong connection between a cybersecurity incident and financial loss. MORE Jane Frankland argues that making CISOs into heroes isn’t helpful. MORE Mark Hillick’s book (DRM-free) on the various paths into security. for $50,000.”
The European Cyber Resilience Act (CRA) which is concerned withcybersecurity obligations for a range of digital products sold in Europe will make its way onto the EU’s statute books following formal approval. No longer will CISOs be questioning whether they can afford to walk away if the culture isn’t right for them?
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content