This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. Nation-states and geopolitical tensions are increasingly fuelling modern cyber threats.
He has led organizations within the cybersecurity industry for over 25 years, and has written books ranging from the best-selling Cybersecurity for Dummies to the official study guide from which many CISOs study for certification exams in advanced information security management. patent filings.
Given the connectivity needs of a remote workforce – and knowing a hybrid workforce is here to stay – many IT teams have had to make sudden changes in the way workers connect to corporate systems that could introduce new cyberrisks and vulnerabilities. . Cloud dominance . Security landscape requires adaptation .
Today’s columnist, Sean McDermott of RedMonocle, says that companies should use the NIST 800-53 security and privacy controls to help find cyberrisk blind spots. The rapid, overnight shift exposed new cyberrisk blind spots and gaps unknown to security leaders or executive teams. Credit: NIST. FIX the cybersecurity gaps.
A group of investors filed the suit which specifically calls out SolarWinds, its former CEO, and also Tim Brown, who is VP of Security and CISO. This week, SolarWinds fired back on the lawsuit's claims and accusations as it defended its CISO and its own cybersecurity actions in court. Summary of SolarWinds response to investor lawsuit.
As a result, cybersecurity has become a top priority for organisations of all sizes, and the C-suite, including CEOs, CFOs, CIOs, and CISOs, plays a critical role in managing and mitigating cyberrisk.
By the way, Sean Scranton will be presenting on "Covering Your Cyber Assets" at the SecureWorld Philadelphia conference on April 19-20. Can companies live without cyber insurance? that may be included as part of the cyber insurance coverage terms. Theresa Le, Chief Claims Officer, Cowbell: "Cyber insurance is highly recommended.
Could artificial intelligence (AI) be the key to outsmarting cyber threats in an increasingly connected world? These are questions I’ve been asking myself recently as AI and cybercrime have become hot topics in the tech industry, and for world leaders. Is it our only hope for survival?These
This morning, Critical Start released its first ever CyberRisk Landscape Peer Report , which explores some of the major concerns and challenges currently confronting cybersecurity leaders as they manage risk within their organizations. Here are some comments on the cyberrisk landscape from cybersecurity vendor experts.
This is the year that cybersecurity and cybercrime really hit home on Mainstreet. And now CISOs and security teams are getting some surprise mainstream exposure from comedians as they turn cyber headlines into security punchlines. More attacks, more real-world impacts, and more headlines. 1-2-3-4-5-6-7!".
Nowadays, organisations need digital leaders such as CIOs, CISOs, and CTOs who are strategists, visionaries, and know how to manage, effectively. The pressure for those in charge is immense as cyberrisks have scaled, and can now bring businesses, economies, and communities to a halt. billion) is expected online.
According to Group-IB, the likelihood of the database systems being used in cybercrime and security breaches is high. A data breach, a follow-up strike on clients whose data was exposed, and other risks may result from an exposed database. Hackers could use the same methods as Group-IB to exploit the databases.
Those who had the opportunity to attend this year's conference heard some amazing keynote sessions, starting with the opener on Day 1 of the event by Andrew Smeation, CISO for Afiniti. Our second keynote of Day 1 was given by the eccentric Chris Roberts, CISO of Boom Supersonic. technological competitiveness.
In his bi-weekly Inflection Point bulletin, Kip Boyle , vCISO, CyberRisk Opportunities LLC, said: "As far as I know, this is a first in the history of cyberrisk management. Cybercrime is a human problem," Kelso said. "If And, this isn't just a slap on the wrist. It's a complete eviction from the U.S.
Intel 471 CISO Brandon Hoffman joins us to to discuss Darkside, the ransomware group that attacked the Colonial Pipeline, why the crew may have bitten off more than it can chew and what the attack says about the state of America's Critical Infrastructure. ” -Brandon Hoffman, CISO Intel 471. Read the whole entry. »
At SecureWorld's regional cybersecurity conferences , we've heard more than a few CISOs say something like this: "You need to have a conversation with your board in advance. Cyberrisk mitigations to implement right away. What are the risk mitigations organizations should embrace as quickly as possible?
Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyberrisk. Prior to joining Delta Dental, Almeida was the CISO at Covanta Holding Corporation, a leader in energy-from-waste management services.
“Where we might have previously relied on what was provided in a short, written application, today we regularly have hour-long underwriting calls with clients, often speaking with their CISOs and security teams, to understand their risk and what security protocols they have in place.”. AI, ML Playing a Role.
Deryck Mitchelson, EMEA field CISO for Check Point, chimed in on this point. This allows police to learn more about current cyberrisks, he explained: “intelligence is the bedrock of policing”. This note of empathy for victims of cybercrime was one of the strongest themes of the day.
Creeping cyberrisk grabbing global headlines The World Economic Forum’s latest Global Cybersecurity Outlook 2024 gives senior leaders a high-level overview of cybersecurity trends. Cyber attacks featured in the top five risks for the year ahead, along with factors like extreme weather and the cost of living crisis.
A perfect cyber pandemic storm is forming, and threat actors have an opportunity. #3. This year’s predominant attack vectors and cybercrime trends Phishing attacks have continued to be the most prevalent attack vector as fraudsters have sought new ways to exploit our lives – both personally and professionally – any way they can.
Kip Boyle, vCISO, CyberRisk Opportunities LLC: The Challenge of Cultivating Buy-in from Leadership and Employees "Cybersecurity professionals will continue to face a critical challenge: cultivating genuine buy-in from both senior leaders and employees. Growing patchwork of U.S.
Beyond threat actors combining a computer worm with wiper malware and ransomware for maximum impact, there is growing concern about the possible commoditization of wiper malware for cyber criminals due to the maturation of Cybercrime as a Service (CaaS). Some will call on providers to guide them through the relentless cyber storm. “As
The RaaS model is poised to further elevate cybercrime and empower less-skilled crime groups in 2024. The SEC cyber regulations will also drive strategic shifts in security teams. These questions—and their legal implications—will be a forcing function for cyber and corporate alignment.
Part one of the book catalogues how cyber criminals and US adversaries have taken full advantage of systemic flaws in how we’ve come to defend business and government networks. Part two is comprised of essays by CISOs from leading enterprises outlining what needs to get done. This is because economic incentives favor the attackers.
That headache is real, of course, but accountants and lawyers will step up to sort it out," said Mike Wilkes , Former CISO, MLS; Adjunct Professor, NYU. Thinking a bit more widely, though, I can imagine there will be a concomitant rise in cyber espionage and attacks between groups of impacted groups in China and the U.S.
In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyberrisk owners better prepare for the evolving landscape. Ransomware remains a prominent threat, but the methods have evolved.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content