This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Mentioning the phrase “shadow IT” to CISOs often results in an eye-roll or a grimace. As one who spent most of his adult life within government dealing with home-based IT capabilities that far outstripped those in the office, I know this feeling. Sign up for CSO newsletters. ]. | Sign up for CSO newsletters. ].
The role of a Chief Information Security Officer (CISO) is undeniably complex, yet incredibly rewarding. However, the challenges faced by CISOs are mounting, exacerbated by the evolving threat landscape and regulatory environment. These incidents underscore the critical importance of effective governance in cybersecurity programs.
Do you have control of your information in each country, or does the government also have access (and control) of your data? There is no one-size-fits-all set of rules and therein lays the conundrum for CISOs, especially those whose customer base or digital infrastructure crosses political boundaries.
The role of the CISO has evolved, and so have the responsibilities. Some believe a CISO must have technical knowledge and experience as a cybersecurity professional, others think leadership skills such as being able to communicate with boards are what matters most. To read this article in full, please click here
Looking for your next position as a CISO, preferably one with more pay, better benefits, and more on-the-job responsibilities/respect? Then you need to know what skills and qualities prospective employers are seeking now from their CISO hires to maximize your chances of getting your dream job. Previous CISO experience (probably).
It doesn’t communicate enough to other executives,” says Marinkovic, who provides virtual CISO services through Tiro Security and serves on the Emerging Trends Working Group with the IT governance association ISACA. Sign up for CSO newsletters. ].
If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. Remesh Ramachandran, a security researcher and consultant for the government, spells it out in a Medium post. CGEIT: Certified in the Governance of Enterprise IT.
And now, you finally got that call, to be a CISO at an organization. Before diving into security strategies, CISOs need to invest time in understanding the organization's culture, strategic roadmaps, operational dynamics, industry, and so forth. Was there a previous CISO? You ' ve worked in the trenches.
The May ransomware attack on Colonial Pipeline exposed the country’s significant vulnerability to cyberthreats. To read this article in full, please click here (Insider Story)
But Engle says he didn’t like other aspects of his position, particularly the governance and regulatory requirement tasks that intensified following the 2002 passage of the Sarbanes-Oxley Act. I liked that thrill of putting solutions in place that stop something bad from happening,” he adds. To read this article in full, please click here
and its Chief CISO, Timothy G. government agencies and Fortune 500 companies. The case highlights the critical role of CISOs and other cybersecurity leaders in maintaining transparent and effective security practices. Securities and Exchange Commission (SEC) against SolarWinds Corp.
Authentication remains one of the most painstaking challenges faced by CISOs in organizations large and small. Authentication a significant obstacle for modern CISOs. Authentication continues to test CISOs for several reasons, with its modern definition being the first to address, Netskope CISO Lamont Orange tells CSO. “We
We are unsure what the rest of 2021 has in store, but the most successful CISOs will be the ones ensuring security teams have access to the latest intel and tools to be prepared for emerging threats. James Carder, CSO, LogRhythm. In March 2021, President Biden signed the $1.9 Pivoting to a Global Focus for Optimal Success.
Chief Information Security Officers (CISO) have the luxury of being an incredibly hot commodity, so they can pretty much pick and choose where they work, as they are almost guaranteed to have a job waiting for them somewhere. Cybersecurity concerns in Florida State Government. Cybersecurity officials struggle in Florida.
The State of California experiences more than 200 million malicious probes every day – the equivalent of nearly 139,000 malicious correlated events per second. To read this article in full, please click here (Insider Story)
For the first time, over a dozen cybersecurity companies have come together to produce an agnostic study titled LATAM CISO Report 2023: Insights from Industry Leaders. The 2023 LATAM CISO Report offers different cybersecurity perspectives of industry leaders in Latin America. Duke University conducted the survey.
Our opening keynote, Marching on in 2021: Cyber Resiliency in Security , was filled with five stellar CISOs from different organizations and industry verticals: Mark Eggleston, VP, Chief Information Security and Privacy Officer at Health Partners Plans. Anahi Santiago, CISO at ChristianaCare Health System. How can CISOs innovate?
CISOs report a growing focus on managing AI-generated vulnerabilities and addressing insider threats amplified by the misuse of advanced AI tools. CISOs are working on improving collaboration with federal partners to share intelligence and best practices for AI threat management. Promote the CISO's role in digital transformation.
Elite de Carga would sell these capabilities to the Mexican state government of Baja and Durango for what was tacitly understood to be for political as well as law enforcement purposes. To read this article in full, please click here
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »
Nearly 100 customers of the popular network monitoring tool were affected, including government entities and cybersecurity company FireEye. Late last year, a group believed to be Russia’s Cozy Bear (APT29) successfully compromised SolarWinds’ Orion update software , turning it into a delivery vehicle for malware.
Michael Gregg, the CISO for the State of North Dakota, speaks across the country, including keynoting at SecureWorld Detroit on Sep. His common sense approach to cybersecurity has made North Dakota a leader among state and local governments with unique challenges as public entities. 19 and at SecureWorld Dallas on Oct.
Public companies will also have to share details about their "cybersecurity risk management, strategy, and governance" on an annual basis. Risk Management and Strategy Disclosure: Companies must disclose their cybersecurity risk management policies, governance procedures, and incident response plans in their annual reports.
Climate-related factors such as shifting weather patterns, resource availability, and mass migration could alter the cyberthreats organizations and governments face, introducing new or heightened risks in an already complex landscape. C above the preindustrial average for the first time in an individual year.
It's offered by ISACA, a nonprofit professional association focused on IT governance with a number of certifications in its stable, including CISM. For more background, read CSO 's explainer on ERM or our article on risk management mistakes CISOs still make.) To read this article in full, please click here
Notably, the Russian government has used cyber as a key component of their force projection over the last decade, including previously in Ukraine in the 2015 timeframe. homeland, we are mindful of the potential for the Russian government to consider escalating its destabilizing actions in ways that may impact others outside of Ukraine.".
The geopolitical landscape is changing by the hour, as more governments take action to restrict Russia’s ability to wage war. The actions of governments are creating a conundrum, for some, of business or conscience. It will be the CIO, CISO and biz ops who will shoulder the implementation.
He details the war aims of Russia, including destroying the Ukrainian government, society, population, and the country as a whole. His closing keynote provides eye-opening details about the cyber war between Ukraine and Russia now that it's eight months in. And 9 more informative sessions.
CISOs of entities in defense, intelligence, or critical infrastructure should be monitoring what is taking place in Ukraine and heeding the advisories being issued by the U.S. The realpolitik of the Russian efforts and the media focus is on the likelihood of Russia taking this course of action. Cyberattacks on Ukraine.
CISOs have long been tasked with building response and recovery capabilities, the objective being to have teams that can react to a security incident as quickly as possible and can restore business functions with as little damage as possible. To read this article in full, please click here
And the recent clarifications—focusing on material cybersecurity incidents—is a step in the right direction," said Glenn Kapetansky , CSO, Trexin Group. "In In the short term, however, the definition of 'material'—which depends on sector and even timing—is murky enough that CISOs are still uncertain what is material and what is not.
government. If your entity is collecting customer data, it is possible you’ll receive a lawful request for the data from a government entity. A recent Bloomberg piece highlighted how Meta Platforms, Inc., parent company of Facebook) and Apple, Inc., This may take the form of a warrant, subpoena or national security letter.
Our MDR offering is built for CISOs, CTOs and SOC (Security Operations Center) managers looking to increase visibility within their environments, reduce security staffing pressures, and speed up incident response,” says Kal De, vice president and general manager of security business unit at VMware. “As
Section 702 specifically addresses how the US government can conduct targeted surveillance of foreign persons located outside the US, with the compelled assistance of electronic communication service providers, to acquire foreign intelligence information.
By Konrad Fellmann, CISO and VP of IT infrastructure, Cubic Corporation. This is why we consider ransomware to be a significant threat to not only transit agencies but all enterprises and government agencies. We are living in a time where every person and business is vulnerable to cyberthreats. and global) commerce and cities to run.
Narrow consumer privacy bills that address a range of issues—including protecting biometric identifiers and health data or governing the activities of specific entities like data brokers or internet service providers—have been introduced in several states, as well. RELATED: Uber CSO Found Guilty: The Sky Is Not Falling. Jaworski added.
Our Controls Framework was maybe the most important investment of it all," Jamil Farshchi, CISO at Equifax, said in a recent LinkedIn post. It's the right thing to do, and it's what's necessary in order for businesses, government, and society to become more cyber secure. Data governance is key—especially if data is your business.
Insider threat and risk management programs are the Achilles heel of every corporate and information security program, as many a CISO can attest to. The MITRE Inside-R Protect program is the organization’s latest initiative to assist both public and private sector efforts in addressing the insider threat.
Plus, a PwC study says increased collaboration between CISOs and fellow CxOs boosts cyber resilience. Less than 50% of respondents say their organizations’ CISOs are involved “to a large extent” with strategic planning, reporting to the board and overseeing tech deployments.
» Related Stories Spotlight Podcast: QOMPLX CISO Andy Jaquith on COVID, Ransomware and Resilience Spotlight Podcast: RSA President Rohit Ghai warns Digital Transformation is magnifying Enterprise Risk Ahead of Black Hat: Fear and Pessimism in Las Vegas. Also joining us: Sam Curry, the CSO of Cybereason. Read the whole entry. »
It was apropos that Ray Yepes, newly appointed CISO for the State of Colorado, opened the 2022 SecureWorld Denver conference on October 6th. The federal government invested billions of dollars doing just that. Ray Yepes, CISO for the State of Colorado, presents the opening keynote. And don't forget the private sector.
Arun Vishwanath from his office in Buffalo, New York and discuss some of the recent high-profile security breaches and some of the urgent cyber security threats faced by governments and businesses. The SolarWinds software that is used by thousands of federal government agencies and corporations in the US and aboard was hacked.
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. appeared first on The Security Ledger with Paul F. Click the icon below to listen.
Responses edited for clarity and length: Ambuj Kumar , CEO, Simbian Kumar While the SEC has fined the corporations, CISOs are worried that they may be held individually responsible and feel targeted by both attackers and now law enforcement. There should not be any subjectivity on what makes an incident go beyond the threshold of disclosure.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content