This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Security and Exchange Commission (SEC) recently laid down the hammer charging and fining four prominent cybersecurity vendors for making misleading claims in connection with the SolarWinds hack. Daniel Lakier , Field CSO, Myriad360 Lakier Cyber professionals represent the companies they work for and are meant to protect them.
A review of the executives pages published by the 2022 list of Fortune 100 companies found only four — BestBuy , Cigna , Coca-Cola , and Walmart — that listed a Chief Security Officer (CSO) or Chief Information Security Officer (CISO) in their highest corporate ranks. Image: IANS Research.
Truth, transparency and trust are the three T’s that all CISOs and CSOs should embrace as they march through their daily grind of keeping their enterprise and the data safe and secure. The case against Uber’s former CSO. Failure to adhere to the three T’s can have serious consequences.
In a LinkedIn post today, June 26th, Jamil Farshchi, EVP and CISO at Equifax, had this to say about the news: "This is a really big deal. It's unprecedented: this is likely the first time a CISO has ever received one of these. So it seems odd for a CISO to get one of these," he wrote. federal securities laws."
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. Key findings from the report include: 90% of CISOs are concerned about stress, fatigue, or burnout affecting their team's well-being.
Department of Justice just filed federal charges against Uber's former Chief Security Offier (CSO) for allegedly covering up a company data breach and bribing hackers to stay silent about the attack. What is Uber's former CISO accused of doing? Here is more on the charges against the former Uber CSO.
The panel members’ engaging insights remain instructive to CISO s today as security leaders strive to hone their increasingly important board presentation approaches. Another board member stressed that she focused nearly all her attention during CISO presentations on the information pertaining to the security budget.
It is a common feeling in the cybersecurity community that CISOs do not sleep well at night. CISOs worry about the latest incident, end of life technology in their environment, breaches in the news, insecure users and vendors, penetration testing results, budget and resources, and the latest vulnerability report (to name a few).
Like CISOs everywhere, he has seen bad actors ratchet up their attacks and do increasingly more harm with successful hacks. Success is nonnegotiable for Rohrbaugh, who took over as chief information security officer at JetBlue Airways in 2019. To read this article in full, please click here
Nearly half of CISOs will change jobs by 2025 due to stress caused by the risk of being breached while trying to retain staff, according to the Gartner report, Predicts 2023: Cybersecurity Industry Focuses on the Human Deal. This includes the knowledge that there are only two possible outcomes: get hacked or don’t.
The trial of former Uber CISO Joe Sullivan marks the first time a cybersecurity chief has faced potential criminal liability. Sullivan is charged with trying to conceal from federal investigators the details of a 2016 hack at Uber that exposed the email addresses and phone numbers of 57 million drivers and passengers.
and its Chief CISO, Timothy G. The case highlights the critical role of CISOs and other cybersecurity leaders in maintaining transparent and effective security practices. On July 18th, a significant ruling came from a New York federal judge who dismissed most of the claims brought by the U.S.
We are unsure what the rest of 2021 has in store, but the most successful CISOs will be the ones ensuring security teams have access to the latest intel and tools to be prepared for emerging threats. The SolarWinds hack brought the need for federal mandates on third-party vendors and suppliers to light in an unprecedented way.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. For Hacking. Read the whole entry. »
Yesterday, a federal jury handed down a guilty verdict to Joe Sullivan, the former CSO on charges of “obstruction of the proceedings of the Federal Trade Commission and misprision of felony in connection with the attempted cover-up of a 2016 hack at Uber” according to a notice published by the Department of Justice (DOJ).
Department of Justice (DOJ) released information surrounding the guilty plea of Mexican businessman Carlos Guerrero and his conspiracy to sell and use hacking tools that were manufactured by companies in Italy, Israel, and elsewhere.
Security exec Chad Kliewer had heard the initial reports of the SolarWinds attack as news about it broke in December 2020, sympathetic to those companies first named as victims of the hack. To read this article in full, please click here (Insider Story)
CISOs report a growing focus on managing AI-generated vulnerabilities and addressing insider threats amplified by the misuse of advanced AI tools. CISOs are working on improving collaboration with federal partners to share intelligence and best practices for AI threat management. Promote the CISO's role in digital transformation.
CISOs of entities in defense, intelligence, or critical infrastructure should be monitoring what is taking place in Ukraine and heeding the advisories being issued by the U.S. Within the hour news of the hacks began appearing within the Russian media. These preparatory actions include a widespread cyber component.
By Konrad Fellmann, CISO and VP of IT infrastructure, Cubic Corporation. Another top goal for malicious hacks on transit agencies is getting a ransom paid. We are living in a time where every person and business is vulnerable to cyberthreats. and global) commerce and cities to run.
Thanks in part to the harsh publicity and severe damage caused by state-sponsored hacks that day is finally in sight. A CISO or CSO should be able to look at a single screen and understand in minutes how well protected they are against potential threats. Consolidation is one of Gartner top five trends this year.
Plus, a PwC study says increased collaboration between CISOs and fellow CxOs boosts cyber resilience. Organizations feel most vulnerable to the threats that worry them the most, including cloud risks, hack-and-leak attacks and third-party breaches. Meanwhile, a report finds the top cyber skills gaps are in cloud security and AI.
2 - CISOs will turn to multi-cloud security platforms When it comes to the cloud, enterprises are increasingly wary of putting all their eggs in one basket. In 2025, CISOs will be challenged to strike a balance between driving forward technological adoption and ensuring the security and resilience of these tools.
A hacking collective compromised roughly 150,000 internet-connected surveillance cameras from Verkada, Inc., Such revelations create intrigue as to whether a more insidious actor could perform a similar hack in order to conduct industrial espionage by spying on development and production activity.
» Related Stories Spotlight Podcast: QOMPLX CISO Andy Jaquith on COVID, Ransomware and Resilience Spotlight Podcast: RSA President Rohit Ghai warns Digital Transformation is magnifying Enterprise Risk Ahead of Black Hat: Fear and Pessimism in Las Vegas. Also joining us: Sam Curry, the CSO of Cybereason. Read the whole entry. »
He is active in CIO Roundtables, CISO Chicago, the Chicago Life Sciences Consortium, and the Technology Leaders' Association. Fun fact: my six years as CSO of Trexin is my first official full-time security role! Answer: The day at my dotcom when Korea hacked one of our three web servers. Answer: Energized.
This was how the Sony Pictures ransomware hack also took place in late 2014 and since. The SolarWinds software that is used by thousands of federal government agencies and corporations in the US and aboard was hacked. Early this year, we leant about a hack into a municipal water filtration system in Florida.
Chris Walcutt, the CSO at DirectDefense talks about the rapidly changing threat landscape that critical infrastructure owners and operators inhabit, and how savvy firms are managing OT cyber risks. The post Spotlight Podcast: OT Is Under Attack. appeared first on The Security Ledger with Paul F. Click the icon below to listen.
Under the guidance of Dan Meacham, VP of Global Security and Corporate Operations and CSO/CISO, the multi-billion dollar organization transitioned from on-premises data centers to the cloud in 2012. Legendary Entertainment is a global media company with multiple divisions including film, television, digital studios, and comics.
After all, there are some mistakes you should absolutely never make – missteps that can cost your business its reputation, and get you into hot water with consumers, the hacking community or legal and regulatory authorities. There are important considerations when taking such an action.
It is not only the CISO, CSO or CIO’s responsibility to care and do the right thing. Bring in an ‘expert’ – Has the company hired reputable third-party experts to perform a risk analysis or see if they can “hack into” the company systems? Everyone is responsible and accountable.
Last Friday, July 2, in a matter of a few minutes, a Russian hacking collective, known as REvil, distributed leading-edge ransomware to thousands of small- and mid-sized businesses (SMBs) across the planet — and succeeded in locking out critical systems in at least 1,500 of them. Dom Glavach, CSO and chief strategist, CyberSN.
And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy. 6 - State CISOs on the frontlines of AI security As the cybersecurity risks and benefits of AI multiply, most U.S. state CISOs find themselves at the center of their governments' efforts to craft AI security strategies and policies. national security.
Consequently, when different sophisticated hacking techniques, types of assaults, and malware are learned, your innocent employees become your cyber security partners. What are the benefits of cyber security awareness trainings? You will create cyber awareness among your staff, as well as users, partners, customers.
SolarWinds redux In many ways, CrowdStrike was a repeat of the SolarWinds supply chain hack. Dimitri Chichlo , CSO, BforeAI Chichlo Our networks remain fragile because of interdependence and the assumption that technology always works. Don’t fall victim to downloading phony solutions.
DeRusha recently updated his LinkedIn profile to his new role: CISO of the United States Government. As the Federal CISO, DeRusha has a number of responsibilities. Biden hired him for the purpose of preventing a repeat of what happened in 2016 with the Russian hack of the Clinton campaign.
Also, we cover the top 10 cyber attack methods used by Iran and its hacking groups. Featured interview: CISO and cyber attorney Alexander Urbelis who uncovered this cyberattack. Huawei USA's CSO answers questions about trust, verification, cybersecurity, and supply chain security. Details: Can Huawei be trusted?
Sophisticated social engineering tactics, phishing campaigns, or financial incentives make it easier for cybercriminals to use insiders as tools for gaining access and maintaining their foothold in systems rather than hacking in. Useful resources include: The Professional Association of CISOs at [link].
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content