This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The Chief Information Security Officer (CISO) has become one of the most critical roles in modern organizations. Tasked with safeguarding data and infrastructure, CISOs face mounting pressures as cyberthreats escalate, regulatory demands grow, and the role expands to encompass strategic business responsibilities.
The person handing the decision making on budgeting is often the CFO, so CISOs would be wise to learn the best ways to interact with these finance professionals. Learn the 5 key qualities of successful CISOs, and how to develop them and 7 security incidents that cost CISOs their jobs. Sign up for CSO newsletters. ].
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Image: IANS Research.
The role of a Chief Information Security Officer (CISO) is undeniably complex, yet incredibly rewarding. However, the challenges faced by CISOs are mounting, exacerbated by the evolving threat landscape and regulatory environment. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling.
states and the District of Columbia, marking a period where the impact of COVID-19 has subsided yet new threats have surfaced. CISOs report a growing focus on managing AI-generated vulnerabilities and addressing insider threats amplified by the misuse of advanced AI tools. Promote the CISO's role in digital transformation.
While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyberthreat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support.
When I asked CISOs about their cyberthreat intelligence (CTI) programs about five years ago, I got two distinct responses. Large, well-resourced enterprises were investing their threat intelligence programs with the goal of better operationalizing it for tactical, operational, and strategic purposes.
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. The report claims that a 600% rise in cyberthreats since the COVID-19 pandemic has led to increased stress levels for those working in the cybersecurity sector.
As we enter quarter four of 2021, the idea of disinformation as a cyberthreat probably hasn’t percolated to the forefront of concerns of many CISOs. Indeed, a Venn diagram would show no overlap of “disinformation” with the words “CISO” or “cyberthreat,” especially in the United States.
Proofpoint today released its annual report titled, "2023 Voice of the CISO: Global insights into CISO challenges, expectations and priorities," in which it surveyed 1,600 CISOs sharing their experiences over the past year and their outlook for what is to come for the cybersecurity industry.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyberthreats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. For Hacking.
In a move that has raised concerns about the company's cybersecurity posture, Amy Bogac, Clorox's CISO, has stepped down from her position. For CISOs, the 'C' in the title designates a considerable degree of responsibility for material business value.
And according to Fortinet’s State of Ransomware survey , 96% of organizations indicate that they are concerned about the threat of a ransomware attack, with 85% reporting that they are more worried about a ransomware attack than any other cyberthreat. To read this article in full, please click here
As CISOs look to prepare their 2023 security budgets, some might be asking themselves, “where do I begin?” There are such varied and rapidly changing facets of defending organizations against cyberthreats that the task of sorting out which risks need the most attention can seem overwhelming.
CISA Director Jen Easterly and Executive Assistant Director for Cybersecurity Eric Goldstein wrote, “A cyberthreat to one organization is a threat to all organizations,” in an essay for Foreign Affairs.
Michael Gregg, the CISO for the State of North Dakota, speaks across the country, including keynoting at SecureWorld Detroit on Sep. A recent blog by Frank Domizio titled " The CISO Role: Beyond Technology " explores exactly what I am talking about. That's a soft skill that even the most adept CISOs are still trying to master.
The traditional centralized approach via MPLS and VPNs is becoming not only expensive, but also challenging to secure against ever-evolving cyberthreats. Clear benefits are recognized by 98% of organizations, according to the 2021 CISO Survival Guide from Cisco Investments.
As the physical threat of war continues to rise, so do the cyberthreats for any country that may stand against Russia. Such an alert backs the office of the CISO when presenting security priorities to the board and other senior executives.". Identifying the signal in the noise is a skill developed through experience.
Sam Masiello , CISO at The Anschutz Corporation, had this to say back in July: "I would expect that many CISOs today are feeling as if their job just got harder and now has a brighter spotlight shining specifically on them. I would think that boards would want to have that experience, even though it is somewhat difficult to come by.
While acknowledging there are “not currently any specific credible threats to the U.S.,” Neuberger was briefing the global media when she made this observation on February 2 as she spoke to the continued presence of Russian cyberthreats to Ukraine and beyond.
Seasoned CISOs/CSOs understand the importance of effectively communicating cyber risk and the need for investment in cybersecurity defense to the board of directors. To ensure cybersecurity becomes a strategic part of the corporate culture, it is crucial for CISOs to present the topic in a clear, concise, and compelling manner.
And the recent clarifications—focusing on material cybersecurity incidents—is a step in the right direction," said Glenn Kapetansky , CSO, Trexin Group. "In In the short term, however, the definition of 'material'—which depends on sector and even timing—is murky enough that CISOs are still uncertain what is material and what is not.
Shannon Lawson, CISO for the City of Phoenix, and Geoffrey Coulehan, Head of Sales for MixMode recently joined forces for a fireside chat at the Evanta CISO Summit in Phoenix, AZ. The post Video: Modernizing Phoenix’s Cybersecurity to Combat Nation-State Attacks appeared first on Security Boulevard.
Is it the Chief Information Officer (CISO) or the Chief Security Officer (CSO)? You might think that the CISO, who is responsible for all things digital protection, is the natural fit for the role. We’ve previously written about who owns digital executive protection for the long haul?
By Konrad Fellmann, CISO and VP of IT infrastructure, Cubic Corporation. Plus, a recent report by the Mineta Transportation Institute doubled down on the need for C-level security and technical expertise—for instance, hiring a chief security officer (CSO) or chief information security officer (CISO).
While in past years, InfoSec was previously the focus and CISOs were the norm – we’re moving to a new cybersecurity world order that expands the role of the CISO to a CSO (Chief Security Officer). 5G began its disruptive charge in 2021, and this will continue to accelerate in 2022.
Plus, a PwC study says increased collaboration between CISOs and fellow CxOs boosts cyber resilience. Meanwhile, a report finds the top cyber skills gaps are in cloud security and AI. And get the latest on SBOMs; CIS Benchmarks; and cyber pros’ stress triggers.
» Related Stories Spotlight Podcast: QOMPLX CISO Andy Jaquith on COVID, Ransomware and Resilience Spotlight Podcast: RSA President Rohit Ghai warns Digital Transformation is magnifying Enterprise Risk Ahead of Black Hat: Fear and Pessimism in Las Vegas. Also joining us: Sam Curry, the CSO of Cybereason. Read the whole entry. »
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. appeared first on The Security Ledger with Paul F. Click the icon below to listen.
Security leaders face the dual challenge of needing to stay competitive in a rapidly evolving business landscape while also defending against increasingly serious cyberthreats, reducing complexity, and facilitating their organization’s digital transformation.
As organizations continue facing escalating cyberthreats, how they communicate multiplying and rapidly morphing cyber exposures – in essence how much they choose to abide by industry standards and embrace ethical practices — remains under intense scrutiny. There is only one path forward: transparency.
Nation-State CyberThreats. Details: We discuss the "Big Four" nation-state bad actors and the cyber attacks they are capable of. Details: We discuss the "Big Four" nation-state bad actors and the cyber attacks they are capable of. Also, we cover the top 10 cyber attack methods used by Iran and its hacking groups.
Three additional individuals also signed, but their current affiliated organizations were not specifically referenced in the letter: Michael Daniel, president and CEO of the CyberThreat Alliance and former Special Assistant to President Obama and Cybersecurity Coordinator on the National Security Council Staff; Elayne Starkey, former Delaware CSO/CISO; (..)
VoIP phishing and impersonation also victimized millions of corporate employees across the world , contributing to an even greater cyberthreat. Cloud security success and choosing the right investments is all about having a clear understanding of threat types and their resulting damages.
To get more details, check out the CISA alert “ Foreign Threat Actor Conducting Large-Scale Spear-Phishing Campaign with RDP Attachments. ” That’s the main takeaway from the Center for Internet Security’s list of the 10 most prevalent malware used during the third quarter.
Dimitri Chichlo , CSO, BforeAI Chichlo Our networks remain fragile because of interdependence and the assumption that technology always works. Dylan Owen , CISO, Nightwing Owen Now is a good time to review incident response plans and identify any weak spots, like missing backups.
In a move demonstrative of international cooperation and partnership, the Five Eyes (United States, Australia, Canada, New Zealand, and United Kingdom) issued an alert giving a “comprehensive overview of Russian state-sponsored and cybercriminal threats to critical infrastructure.”
Tyler Farrar , CISO, Exabeam Farrar Traditional SIEM solutions face numerous challenges with limited ability to adapt to new threats and attack vectors — and complex deployment and maintenance processes. Not surprisingly, threat actors increasingly use AI to launch attacks more efficiently and stealthily.
Cyber attacks nowadays do not often come from ingenious ‘hackers’ in dark rooms, they’re often the result of an employee reusing the same password, or businesses not implementing basic practices such as multi-factor authentication. By acting smart now, we can eliminate some of the greatest cyberthreats facing our businesses today.”
Separately, the new Regulation S-K Item 106 requires public companies to detail their processes for identifying and managing risks from cyberthreats, the role of management and the board of directors in managing such risks, and the potential impact from cyberthreats and from any previous cybersecurity incidents.
Research by e2e-assure reveals a significant gap between perception and reality; while 85% of cyber risk owners express confidence in their AI policies, only 34% of employees are even aware such guidance exists. Cyberthreats often exploit human errors, whether through phishing attacks, weak passwords, or lapses in protocol.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content