This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. Still, the top response stood out clearlyprotecting dataprivacy.
In a LinkedIn post today, June 26th, Jamil Farshchi, EVP and CISO at Equifax, had this to say about the news: "This is a really big deal. It's unprecedented: this is likely the first time a CISO has ever received one of these. So it seems odd for a CISO to get one of these," he wrote. federal securities laws."
On page 34 of the report, Accenture dives into the risk that cyber poses to the business. The section on cyberrisk is in bold: "We face legal, reputational and financial risks from any failure to protect client and/ or Accenture data from security incidents or cyberattacks.".
Adding to the growing importance of the CISO role, required disclosures will also include how often and by which processes board members are informed of and discuss cyberrisk. The new rules indeed show the increasing importance of the CISO's role, particularly as it pertains to communication with the board.
Designate a qualified individual (CISO or equivalent) responsible or overseeing and implementing a cybersecurity program and enforcing its cybersecurity policy. Require the CISO to provide a written report at least annually to the board or equivalent governing body. It's a core responsibility of the board and management team.".
Those who had the opportunity to attend this year's conference heard some amazing keynote sessions, starting with the opener on Day 1 of the event by Andrew Smeation, CISO for Afiniti. Our second keynote of Day 1 was given by the eccentric Chris Roberts, CISO of Boom Supersonic. Tuma's session was titled Cybersecurity Is a Team Sport!
Ultimately, he believes “this is good for businesses as, through the insurance process, they will gain better visibility into their cyberrisks and measures they can deploy to keep digital operations secure and compliant to dataprivacy regulations.”. billion in premium.
Tuma often finds himself in the middle of ransomware incident response as Co-Chair of the DataPrivacy & Cybersecurity Practice at law firm Spencer Fane. Ransomware: one of your organization's top risks. Now, here is a crucial question: does your organization treat cyberrisk like it is business risk?
“Where we might have previously relied on what was provided in a short, written application, today we regularly have hour-long underwriting calls with clients, often speaking with their CISOs and security teams, to understand their risk and what security protocols they have in place.”. AI, ML Playing a Role.
Other buzz words and topics that are top of mind: Quantum computing; NIST standards; a patchwork of dataprivacy legislation and standards with hope for more consistency; foreign adversaries ramp up their efforts and the U.S. Preparing for Q-Day in 2025 should be a top priority for CISOs for this very reason.
Balonis Frank Balonis , CISO, Kiteworks By 2025, 75% of the global population will be protected under privacy laws, including U.S. state privacy laws, the EUs governance of ethical AI deployment, and updated regulations in India and Japan. The NIST Cybersecurity Framework 2.0
Last Watchdog posed two questions: •What should be my biggest takeaway from 2023, with respect to mitigating cyberrisks at my organization? Cryptographic inventories need finalizing and quantum safe encryption needs to be adopted for sensitive communications and data. Their guidance: Snehal Antani , CEO, Horizon3.ai
Curated advice, guidance, learning and trends in cybersecurity and privacy, as chosen by our consultants. Cyberrisk remains top of mind for business leaders A regular January fixture, the World Economic Forums Global Risk Report 2025 features two technology-related threats among the top five risks for the year ahead and beyond.
“All of this means cyberrisk continues to escalate and that CISOs need to be just as nimble and methodical as the adversary.”. “With an economic downturn on the horizon, CISOs are making sure they are investing in the most effective tools to maximize cyber ROI. Similarly, the U.S. Finally, Some Hope.
” Still, Exabeam CISO Tyler Ferrar told eSecurity Planet by email that he’s hopeful the rules will benefit consumers too by encouraging better security. “They lack the systems to quantify risk at broad and granular levels.” “But breach notices are not security – and never will be.”
The proliferation of IoT devices and sensors will accelerate, allowing organisations to collect and leverage data for improved operational efficiency and real-time monitoring. As these regulations scale, expect to see more legal cases and fines on companies and CISOs particularly from the SEC, like the SolarWinds and CISCO, Tim Brown, case.
In this blog, I’m exploring these changes, grouped under key categories that I’ve used in previous years, to help business leaders and cyberrisk owners better prepare for the evolving landscape. The emergence of shadow AIunauthorised AI tools used without IT approvalamplifies these vulnerabilities.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content