This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
He has been calculated to be one of the top 3 cybersecurity influencers worldwide, and has written books ranging from Cybersecurity for Dummies to the official study guide from which many Chief Information Security Officers (CISOs) study for their certification exams. New York, NY – June 23, 2021. About Newsweek. www.newsweek.com.
“Sweet Security’s Cloud Native Detection and Response platform has been a game changer for us,” said Shai Sivan, CISO at Kaltura. Book a meeting with Sweet Security at AWS re:Invent 2024 in Las Vegas here. Sweet is on the frontlines of changing that by giving teams the cross-layer visibility they’ve needed for years.”
Steinberg has also been calculated to be one of the top 3 cybersecurity influencers worldwide, and has written books ranging from the best-selling Cybersecurity for Dummies (now in its second edition) to the official study guide from which many Chief Information Security Officers (CISOs) study for their certification exams.
Known for offering unique perspectives and keen insights on topics related to cybersecurity, AI, and the potential impact of technological developments on human society, he amassed millions of readers last decade while writing for Forbes and Inc., About Newsweek. www.newsweek.com.
The IACP is the publisher of The Police Chief magazine, the leading periodical for law enforcement executives, and the host of the IACP Annual Conference, the largest police educational and technology exposition in the world. The IACP is a not-for-profit 501c(3) organization, and is headquartered in Alexandria, Virginia. patent filings.
I’m delighted to announce the latest member of our growing CISO Advisor team, Pam Lindemeon. At Anthem Pam was considered a bold and strategic thinker who envisioned and delivered a world class Enterprise Information Security strategy, including leading the Steering Committee with cross functional business and technology membership.
AWS customers visiting AWS re:Invent 2024 in Las Vegas can book a meeting to learn more here. Founded by the IDF’s former CISO, Sweet’s solution focuses on the relationships between cloud infrastructure, workloads and applications , as well as network, and identity components.
For years, in articles, lectures, and books I have discussed how the spread of IoT and AI technologies – both individually and together – are dramatically increasing the danger to human life posed by cyberattacks on healthcare facilities.
The rise in personal liability for CISOs and executives (as seen in cases like the SolarWinds lawsuit) has increased focus on governance structures that provide clear oversight, accountability, and protection for decision-makers. Adaptive: Able to adjust security controls dynamically based on evolving threats. I would welcome your options.
The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry. We must reduce barriers to entry.
In 1988 we had the Morris Worm , if you remember from the history books. We’ve been trying to do that for years and as new technologies come into play, that modernization and optimization is critically important. We’ve drilled holes in with VPNs, which are…25-year-old technology. I lived it.
And the developers say this chip could end the "patch and pray" strategy that keeps security teams running in circles and lower the stress level of CISOs in the process. Talk of an unhackable technology reminds me of a fireside chat I saw at a SecureWorld conference a few years ago.
GFCyber is an independent, nonprofit, and non-partisan think tank that helps policymakers address societal challenges created by contemporary technology. It is a collaborative step in the direction that aims to dissect and address the cyber policy and technology issues prevailing in the modern hyper-connected world. About GFCyber.
Related: Preparing for ‘quantum’ hacks That being so, a new book, Fixing American Cybersecurity , could be a long overdue stake in the ground. Part one of the book catalogues how cyber criminals and US adversaries have taken full advantage of systemic flaws in how we’ve come to defend business and government networks.
Michael Gregg is the CISO for the State of North Dakota. In addition to his experience as a security practitioner, he has authored or co-authored more than 20 books, including Hack the Stack , Build Your Own Security Lab , and Security Administrator Street Smarts. A : All technologies can be used for good and bad.
A conversation with Jason Witty, head of cybersecurity and technology controls, and global chief information security officer for JPMorgan Chase. Jason Witty (right) is head of cybersecurity and technology controls, and global chief information security officer for JPMorgan Chase.
–( BUSINESS WIRE )– Blackhawk Network , a global financial technology company and a leader in payment technologies and solutions, today announced veteran information security executive, Selim Aissi, has been named its Chief Information Security Officer. PLEASANTON, Calif.–( About Blackhawk Network.
You Can’t Manage What You Can’t See Why Speed is Important to Asset Discovery In Summary Get a Demo Asset Discovery: A Must Have for Understanding Your Complete Attack Surface Justin Stouder, FireMon’s Asset Manager GM, met with a large financial services company a few years back, talking with the company’s CISO about their asset inventory.
With Black Hat USA 2021 just around the corner, I had a deep discussion about this with Eric Kedrosky, CISO and Director of Cloud Research at Sonrai Security. Sonrai is bringing graph database technology to bear on cloud security at a time when the migration from on-premises company data centers to the cloud is in full swing.
Nowadays, organisations need digital leaders such as CIOs, CISOs, and CTOs who are strategists, visionaries, and know how to manage, effectively. Digital leaders need to solve this issue fast and technology has a valuable part to play in this. They found 1 in 6 CISOs were turning to alcohol or medication to cope with stress.
Simply taking a pause from email and social media in favor of a good book or conversation is known to increase your mood and life satisfaction. Before implementing any long-term security strategy, CISOs must first conduct a data sweep. Disconnecting from your mobile device, laptop or tablet can be as good as a holiday.
The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. In addition, the risks of monetary and operational damage render it mission critical for enterprises to envision and enact the appropriate People, Process, and Technology safeguards to assure data protection and privacy.
Lisa has a passion for connecting business with technology and thrives in transforming disruptive technology into leading solutions. This episode features Matt Sharp, the CISO at LogicWorks, a leading provider of platform driven cloud operations for AWS and Azure.
This makes it hard for CISOs and their teams to gain a view of all digital certificates issued across the enterprise network. At scale, this creates a scenario where CISOs and their teams need to constantly monitor digital certificate lifespans to avoid expiration and potential downtime.
Todd Fitzgerald, a security expert with 20 years of experience as a chief information security officer and author of the bookCISO Compass , was equally direct about the need for automation capabilities in threat intelligence. It used to be the question that would always come up with CISOs: ‘who would want my information.’
Communications security is a set of integrated policies, procedures, and technologies used to protect sensitive information. Bryon Miller is co-founder and CISO at ASCENT Portal , a leading Software-as-a-Service (SaaS) platform for comprehensive security and continuous compliance management. instant messaging, SMS, chat, etc.).
Except for a few “off-the-books” emergency budget requests to cover things cybersecurity insurance claims the provider did not pay, the CISO and CIO pretty much know how many “swords” they have to work with to support 24x7x365 security monitoring and operations. Process-driven- results-oriented management experience.
The information security industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts. Renee Tarun is the Deputy CISO and Vice President for Information Security at Fortinet Inc. Read the whole entry. »
Becoming a chief information security officer (CISO) might not make sense for everyone in the field, and that’s okay. Those new to the industry, or those wondering whether cybersecurity would work for them, will also benefit from the book by Alyssa Miller, Cybersecurity Career Guide.
Most people know that technology creates more jobs than any other industry and that digital is the golden thread that runs across all industries. My best-selling book and movement are all about this and specifically how a failure to attract and retain women in cybersecurity is making us all less safe.
In this instance, the Soviets were stealing Western technology and the CIA slipped the flawed software to them without their knowledge. State-backed actors from countries like North Korea are not just after technology and revenue but also act as conduits for other countries to infiltrate the critical infrastructure of their adversary nations.
As post-quantum continues to mature, we may find ourselves in situations where changing encryption technologies may be more frequent and rapid than previously ever anticipated. Our technology implementations will need to be more agile to accommodate faster change. Looking to future-proof your organization with crypto agility?
As technology leaders, people count on our unwavering commitment to their safety. Therefore, can society trust technology leaders to ensure there's room for both advanced innovation as well as education and training? a sociologist, and director of the Center for Technology Innovation at the Brookings Institution in Washington, D.C.
These include attacks on Taiwanese research agencies in August and attacks on the shipping and logistics, utilities, media and entertainment, technology, and automobile sectors in countries such as Taiwan, Thailand, Italy, UAE, Spain, the United Kingdom, and Turkey in July. Book a consultation with our ICS security experts now.
It can be anything from a Virtual CISO, to creating a cybersecurity strategy or policy, reviewing infrastructure to find security gaps, doing assessments – it’s a broad range of services for clients all over the US. I didn't see a lot of people of color who are CISOs either. For example, shortly after I finished my Ph.D.
Credit union technology firm Trellance own Ongoing Operations LLC, and provide a platform called Fedcomp — used by double digit number of other credit unions across the United States. Companies need to examine if they can securely manage the technology they have deployed, and if it is a good fit for them. We’re all poorer.
The principles enumerated in Schwartau’s book are essential for any blue teamer, regardless of whether you are a CISO, a SOC analyst, a security architect or an incident responder. MVISION Endpoint is part of our McAfee endpoint protection technology, optimized for Windows 10. [1] How long before we detect a compromise?
This installment features Jason Lau , CISO for Crypto.com and an official member and contributor on the Forbes Technology Council. I am currently the Chief Information Security Officer (CISO) at Crypto.com, where I drive the company’s global cybersecurity and data privacy strategy. What job do you do today?
Ami Luttwak | Co-Founder & Chief Technology Officer, Wiz.io. Joe Carson | Chief Security Scientist & Advisory CISO, ThycoticCentrify. Book your demo today. That’s why this session on CQURE CQOffensiveSecurity Toolkit is a must. Breaking the Isolation: Cross-Account AWS Vulnerabilities. Not registered?
It can be anything from a Virtual CISO, to creating a cybersecurity strategy or policy, reviewing infrastructure to find security gaps, doing assessments – it’s a broad range of services for clients all over the US. I didn't see a lot of people of color who are CISOs either. For example, shortly after I finished my Ph.D.
Most guidance comes from a standpoint of inherent bias, whether it be to promote a product class, specific framework/standard, or to best align with specific technologies (legacy/traditional infrastructure, cloud, etc.). For starters, you can look at it be technology grouping: - Network. Applications. -
Dawn Cappelli is VP and CISO at Rockwell Automation. Cappelli was previously founder and director of Carnegie Mellon’s CERT Insider Threat Center and co-authored the book “The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud).”. Find out more here.
A recovering CISO, with more than 30 years' experience of both cybersecurity leadership and client consulting mostly in healthcare, Richard has lived in more than 30 countries and delivered innovative solutions to organizations in all of them. Q : What are you going to do when you eventually retire? A : Not sure I ever will really.
At SecureWorld, we consider all of our Advisory Council members—the CISOs, BISOs, and senior leaders who help us plan each of our 15 in-person conferences—to be true cyber heroes. Her work birthed intrusion detection systems and the legendary "Orange Book," fortifying our digital world against chaos. Navy during World War II.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content