This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The cybersecurity mantra at Jefferson Health is “if we can’t do it well, we’re not going to do it” says Mark Odom, CISO of the Philadelphia-based healthcare organization. Get the latest from CSO by signing up for our newsletters. ]. “Our Learn the 7 keys to better risk assessment. | The pandemic accelerated things of course.”
And now, you finally got that call, to be a CISO at an organization. Before diving into security strategies, CISOs need to invest time in understanding the organization's culture, strategic roadmaps, operational dynamics, industry, and so forth. Was there a previous CISO? You ' ve worked in the trenches.
That means cybersecurity training and education so that key stakeholders understand the risks that businesses are facing, and which strategies are most effective for protection. Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
CISOs report a growing focus on managing AI-generated vulnerabilities and addressing insider threats amplified by the misuse of advanced AI tools. CISOs are working on improving collaboration with federal partners to share intelligence and best practices for AI threat management. Promote the CISO's role in digital transformation.
It should come as no surprise to CISOs to see Easterly dig in and immediately leverage the newly minted Joint Cyber Defense Collaborative (JCDC), which was authorized in the National Defense Authorization Act of 2021. The Senate confirmed Easterly in July, with swearing taking place on August 09, 2021.
Cybersecurity champions programs nurture and encourage cybersecurity awareness within a business, combining education with peer-to-peer collaboration to embed a culture of security understanding, support, and positive behavior among a workforce. To read this article in full, please click here
Seasoned CISO Mike Manrod knows the value of a good cybersecurity vendor evaluation. He recalls that in a past job he inherited some very expensive vaporware under a long-term services agreement. It was a dud. That basic test saved them from making an expensive mistake.
By Konrad Fellmann, CISO and VP of IT infrastructure, Cubic Corporation. Plus, a recent report by the Mineta Transportation Institute doubled down on the need for C-level security and technical expertise—for instance, hiring a chief security officer (CSO) or chief information security officer (CISO).
Dr. Fred Kwong is VP and CISO at DeVry University and is based in Chicago, IL. He has been in the information security and technology field for the past 20 years working in education, financial, telecommunication, healthcare, and insurance sectors. He also serves as an adjunct faculty member at Roosevelt and Benedictine Universities.
A fireside chat on "Things I Wish I Had Known About Cybersecurity Before I Got into a Leadership Role," featuring Britney Kennedy Hommertzheim, BISO, Cardinal Health; Sherry Callahan, CISO, Dairy Farmers of America; Sam Masiello, CISO, The Anschutz Corporation; and Glenn Kapetansky, CSO, Trexin Consulting.
Helpfully, the law also sets forth a minimum of expected responsibilities of a CPO, which should play a role in setting a baseline for the CPO role, similar to what we saw with the development of the CISO role over the last two decades." RELATED: Uber CSO Found Guilty: The Sky Is Not Falling. Jaworski added.
If one was to build a Venn diagram to compare the onboarding, educating, supervising, and offboarding of staff versus contract workers, the areas differences might offer a surprise. In this case, surprises aren’t what a CISO wants to encounter.
People in these roles are responsible for one or more areas of the business and they usually report to the CISO or CTO, based on job descriptions found online and those laid out by multiple sources interviewed for this article.
Judge has faced the same problem, finding that many philanthropic organizations don’t think cyber aligns with their areas of interest, be it economic development and disparity, education or mental health. These includes finance, education and social media giants. But it really does.
Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. Prior to joining Delta Dental, Almeida was the CISO at Covanta Holding Corporation, a leader in energy-from-waste management services.
2 - CISOs will turn to multi-cloud security platforms When it comes to the cloud, enterprises are increasingly wary of putting all their eggs in one basket. Many users and organizations are struggling to keep pace with the education and training needed to comprehensively understand and protect these technologies.
I was fortunate enough to have connected with the previous CISO at the org, and he recruited me into the role. A : This might be different than the usual answer of something like cybersecurity education, but for me I will say communicating why this all matters and why it's important to care about it.
It was apropos that Ray Yepes, newly appointed CISO for the State of Colorado, opened the 2022 SecureWorld Denver conference on October 6th. Ray Yepes, CISO for the State of Colorado, presents the opening keynote. Down the hall, Brenden Smith, CISO at FirstBank, presented "Revisiting Deception Systems: Enterprise Use Cases."
CISO Panel on Addressing Insider Risk. Insider Risk Summit attendees will have opportunities to network, take in product demos, host 1:1 meetings or attend educational sessions and discussions. Security practitioners attending the Summit are eligible to earn 20+ CPE credits.
Sherry brought to Princeton his 25 years of technology experience, 12 of which was in higher education as the former CISO at Brown University. Sherry explained that he (the CISO) would have no operational responsibilities in the beginning to focus solely on the execution of the mission.
It is not only the CISO, CSO or CIO’s responsibility to care and do the right thing. Education – How often are you educating employees on best practices and holding simulations on what to do if a cyber related incident were to occur? Everyone is responsible and accountable.
Unraveling the True Security Risks ” (SecurityWeek) “ How deepfakes threaten biometric security controls ” (TechTarget) “ Deepfakes break through as business threat ” (CSO) 3 - Fake update variants dominate list of top malware in Q3 Hackers are doubling down on fake software-update attacks.
said Dan Meacham, vice president of global security and corporate operations and CSO/CISO at film production company Legendary Entertainment. He also remembers when the president of a major cybersecurity firm “skipped a day of his company’s board meeting to speak to our board members and educate our executive team.”.
TIAA CISO Tim Byrd and company CEO Thasunda Brown Duckett joined other private sector executives and education leaders at the White House this past August to discuss the nation’s need to address cybersecurity threats. There, President Biden called out the growing sophistication of attacks and the increasing damage they’re inflicting.
At the end of the day, lack of education and human error are two of the largest contributors to data breaches. Tyler Farrar ,CISO, Exabeam. Wes Spencer, VP, External CSO, ConnectWise. Examples of this include keeping software up to date, backing up data, and maintaining good password practices. Let’s admit it.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content