This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Like most CSOs, Joe Sullivan was drawn to the role to help prevent cybercrimes. His role as CSO of Uber was something of a shift from his previous job prosecuting cybercriminals as an assistant US attorney, but closer to the tip of the cybersecurity spear.
In most organizations, it is common for both the CISO and CIO to have responsibilities around cybersecurity—an issue increasingly pivotal to the effective running of any modern business. Clear, defined cybersecurity ownership can prove integral to successful organizational security positioning.
Wilson was opening keynote speaker at the recent CSO UK Security Summit where she reflected upon the biggest changes in the risk and security landscape and how CISOs must respond to lead teams and embrace emerging opportunities. What follows are highlights from that presentation. To read this article in full, please click here
Most recently, one of those new schemes involves fake LinkedIn profiles representing Chief Information Security Officers (CISOs) at some of the world's largest corporations. CISO profiles spoofed on LinkedIn. One of the fake profiles that was discovered was for one Victor Sites, claiming to be the CISO at Chevron.
Our opening keynote, Marching on in 2021: Cyber Resiliency in Security , was filled with five stellar CISOs from different organizations and industry verticals: Mark Eggleston, VP, Chief Information Security and Privacy Officer at Health Partners Plans. Anahi Santiago, CISO at ChristianaCare Health System. How can CISOs innovate?
This has happened as the cybercrime cartels have evolved beyond wire transfer frauds to target market strategies, take over brokerage accounts, and island-hop into banks, according to the report.
Such an alert backs the office of the CISO when presenting security priorities to the board and other senior executives.". A CISO needs to curate the threat information feed so they can align their urgency to action from the message. Identifying the signal in the noise is a skill developed through experience.
Signatories also include nonprofit executives Mari Galloway, CEO of the Women’s Society of Cyberjutsu, and Kristin Judge, CEO and founder of the Cybercrime Support Network (CSN). Kristin Judge, Cybercrime Support Network. The problem, however, is that many large foundations, ignore cybersecurity altogether. “A
.” “It would be possible, on detailed examination of video, to compromise elements of operational security,” agreed Mike Hamilton, co-founder and chief information security officer of CI Security and former Seattle CISO. Individual workers’ patterns and habits could be studied as well, to their detriment.
Unraveling the True Security Risks ” (SecurityWeek) “ How deepfakes threaten biometric security controls ” (TechTarget) “ Deepfakes break through as business threat ” (CSO) 3 - Fake update variants dominate list of top malware in Q3 Hackers are doubling down on fake software-update attacks.
Prior to joining Delta Dental, Almeida was the CISO at Covanta Holding Corporation, a leader in energy-from-waste management services. In his role as CISO of Lumin Digital, he is responsible for cybersecurity, risk management and compliance programs to scale the next generation of cloud-based digital banking.
In earlier, more innocent (?) times, cyberattacks seemed to be fairly straightforward. You have the data exfiltration attacks, where copies of sensitive personal information and intellectual property are stolen, often without the victims’ knowledge since the original data are left intact.
The Krebses—Chris and Brian—are not related, but they have both come out with positions on ransomware. Chris was the former head of DHS’s CISA (Cybersecurity & Infrastructure Security Agency), and Brian is a journalist and much-admired author (by me and many others) of the outstanding blog KrebsonSecurity.
Featured interview: CISO and cyber attorney Alexander Urbelis who uncovered this cyberattack. The Enterprise Business Model of Cybercrime. Plus, what hackers are doing in successful attacks and cybercrime warning signs. Huawei USA's CSO answers questions about trust, verification, cybersecurity, and supply chain security.
On Saturday Night Live’s “Weekend Update,”, Kate McKinnon plays Dr. Wayne Wenowdis, the all-knowing physician. In response to COVID-19 and vaccine questions, she says “we know dis,” except when “we don’t know dis.” One of the hilarious Dr. Wenowdis sketches can be viewed at (355) Weekend Update: Dr. Wenowdis on Trump’s Televised Health Exam – […].
Threat Actors Cybersecurity threats are growing more complex and persistent, driven by the heightened activities of nation-state actors and increasingly sophisticated cybercrime groups. Organised Cybercrime Groups Up Their Game Cybercriminals arent resting on old tactics with cybercrime expected to hit $12 trillion in 2025.
Tyler Farrar ,CISO, Exabeam. With cybercrime projected to cost the world $10.5 Wes Spencer, VP, External CSO, ConnectWise. Finding the right balance between security and operability is one of the greatest challenges security professionals face, but it’s absolutely essential for a successful cybersecurity strategy.”.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content