This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Responses edited for clarity and length: Ambuj Kumar , CEO, Simbian Kumar While the SEC has fined the corporations, CISOs are worried that they may be held individually responsible and feel targeted by both attackers and now law enforcement. There should not be any subjectivity on what makes an incident go beyond the threshold of disclosure.
The CSO Hall of Fame was created to spotlight outstanding leaders who have significantly contributed to the practice of information risk management and security. Selected by the editors of CSO, its advisors, and executives, the individuals bestowed with this award exemplify excellence in security leadership.
These events and many more have changed the business landscape and forced CISOs to steer a course through uncertain waters. We also saw, for the first time, a security chief sentenced to prison for concealing a data breach.
In fact, many “CISO priorities lists” are floating out there online and many people claim to know “what CISOs want.” My analyst years taught me to be skeptical about such claims, if only because there are vast differences between CISOs of different organizations, in terms of security maturity, for example.
The CEO’s email landed in Maurice Stebila’s inbox around midnight, the message asking whether Stebila, the company’s CISO at the time, had heard about the latest news-making cyber event. “He He had no idea we were already looking at this event,” Stebila says. Sign up for CSO newsletters. ].
You've gone to events and dinners. And now, you finally got that call, to be a CISO at an organization. Before diving into security strategies, CISOs need to invest time in understanding the organization's culture, strategic roadmaps, operational dynamics, industry, and so forth. Was there a previous CISO?
The event also had a deleterious effect on the SolarWinds stock price. These two events, were, predictably, followed by a bevy of civil lawsuits. The SolarWinds compromise of 2020 had a global impact and garnered the resources of both public and private sectors in an all-hands-on-deck remediation effort.
Implementing zero trust across the entirety of the technology stack would go a long way toward increasing resilience against events like this. Dimitri Chichlo , CSO, BforeAI Chichlo Our networks remain fragile because of interdependence and the assumption that technology always works. Time will tell.
and its Chief CISO, Timothy G. The Form 8-K filings, which are required for major events affecting a company, were considered to have met the necessary disclosure standards. The case highlights the critical role of CISOs and other cybersecurity leaders in maintaining transparent and effective security practices.
It is a common feeling in the cybersecurity community that CISOs do not sleep well at night. CISOs worry about the latest incident, end of life technology in their environment, breaches in the news, insecure users and vendors, penetration testing results, budget and resources, and the latest vulnerability report (to name a few).
This statement was supported by lots of independent research, business press articles, webinars, local events, and even sessions at RSA and Black Hat crowing about the burgeoning relationship between CISOs, business executives, and corporate boards. To read this article in full, please click here (Insider Story)
While last year was different because most of the events were either virtual or cancelled, this year is looking up — Black Hat is dipping its toes back into in-person events with a hybrid approach! Wendy will give the CISO perspective on how to build a sustainable, ongoing program using evidence-based practices.
The State of California experiences more than 200 million malicious probes every day – the equivalent of nearly 139,000 malicious correlated events per second. To read this article in full, please click here (Insider Story)
“Social engineering is inherently people-centric, and regardless of whether threat actors are targeting businesses or individuals, they’re responding in real time to the events and themes that have the attention of the wider world,” Lucia Milic?, global resident CISO at Proofpoint, tells CSO.
Often, CISOs see budget increases following a breach at their organization or in response to what is happening to industry peers. Security is often viewed as a cost center, necessary to keep the business afloat and to avoid costly events, but not generating profit. What drives cybersecurity spend and budget decisions?
The guidance is intended to enhance transparency for investors while avoiding excessive noise from immaterial cyber events being inadvertently disclosed as material incidents. And the recent clarifications—focusing on material cybersecurity incidents—is a step in the right direction," said Glenn Kapetansky , CSO, Trexin Group. "In
The invasion of Ukraine by Russia is reason enough for all CISOs to place their teams at a heightened state of alert and readiness in the event of deleterious cyber actions by nation-state actors or the cybercriminal groups.
Our MDR offering is built for CISOs, CTOs and SOC (Security Operations Center) managers looking to increase visibility within their environments, reduce security staffing pressures, and speed up incident response,” says Kal De, vice president and general manager of security business unit at VMware.
To watch the full presentation, check out the event's agenda and register today. Leighton believes Russia will continue attempts to destabilize critical Ukrainian IT infrastructure; Ukraine will further exploit Russian cyber vulnerabilities; and better integration of cyber and kinetic operations by both sides will occur.
Cybersecurity remains a top challenge, concern, and management focus for CIOs, CSOs and CISOs, according to CIO research. Very loosely, that’s the idea behind the Shared Signals and Events (SSE) Framework , a new standard being developed by the OpenID Foundation.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. Dr. Fred Kwong is VP and CISO at DeVry University and is based in Chicago, IL. Q: Lastly, what are you most looking forward to at your regional SecureWorld conference this year?
And so we think about different types of cybersecurity risk and how those risks or vulnerabilities or threat actors can actually impede that ability or an organization to meet those objectives," said Mary Faulkner, CISO at Thrivent, one of four panelists that took the stage to kick off the conference. Air Force (Ret.);
By Konrad Fellmann, CISO and VP of IT infrastructure, Cubic Corporation. Plus, a recent report by the Mineta Transportation Institute doubled down on the need for C-level security and technical expertise—for instance, hiring a chief security officer (CSO) or chief information security officer (CISO).
Second, prevent that event from happening with data protection spanning endpoints, web gateway, and the cloud. A CISO or CSO should be able to look at a single screen and understand in minutes how well protected they are against potential threats. You can’t build a moat, a wall, or a bubble and say, hey, my work here is done.
Only 37% of organizations responding to a recent Cisco survey said they’re confident they can remain resilient in the event of a worst-case security incident. We don’t secure everything, everywhere, or otherwise business wouldn’t get done,” said Helen Patton, CISO, Cisco Security Business Group.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. I've presented at SecureWorld now six times, in addition to other regional and national events." I was fortunate enough to have connected with the previous CISO at the org, and he recruited me into the role.
It was apropos that Ray Yepes, newly appointed CISO for the State of Colorado, opened the 2022 SecureWorld Denver conference on October 6th. Ray Yepes, CISO for the State of Colorado, presents the opening keynote. Down the hall, Brenden Smith, CISO at FirstBank, presented "Revisiting Deception Systems: Enterprise Use Cases."
For CISOs, the sad truth is that it’s no longer a matter of if an organization will be breached, but when. In the event of a breach, they need to have full visibility into exactly what happened so they can quickly contain the damage and inform customers and other stakeholders in a timely manner.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. He is active in CIO Roundtables, CISO Chicago, the Chicago Life Sciences Consortium, and the Technology Leaders' Association. Fun fact: my six years as CSO of Trexin is my first official full-time security role!
It is tempting for CISOs and CIOs to succumb to the “shiny toy” syndrome: to buy the newest tool claiming to address the security challenges facing their hybrid environment. Every dollar spent on security must produce a return on investment (ROI) in the form of better detection or prevention. To read this article in full, please click here
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. critical infrastructure in the event of a major crisis or conflict” with the U.S. The post Spotlight Podcast: OT Is Under Attack.
Unraveling the True Security Risks ” (SecurityWeek) “ How deepfakes threaten biometric security controls ” (TechTarget) “ Deepfakes break through as business threat ” (CSO) 3 - Fake update variants dominate list of top malware in Q3 Hackers are doubling down on fake software-update attacks.
The Global State of Information Security Survey 2017 suggests that companies should look into deploying threat detection tools and processes (including monitoring and analyzing security intelligence information), conducting vulnerability and threat assessments, penetration tests and security information, and event management (SIEM) tools.
” Still, Exabeam CISO Tyler Ferrar told eSecurity Planet by email that he’s hopeful the rules will benefit consumers too by encouraging better security. . “I think companies and investors alike, however, would benefit if this disclosure were made in a more consistent, comparable, and decision-useful way.”
Tyler Farrar ,CISO, Exabeam. And for those that fell victim, many experienced multiple ransomware events. Wes Spencer, VP, External CSO, ConnectWise. National Cyber Security Awareness Month 2021 is a time to reflect on the major technological and lifestyle shifts brought on by the pandemic and their security implications.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content