Remove CISO Remove Cyber Risk Remove Technology
article thumbnail

LW ROUNDTABLE: Wrist slap or cultural shift? SEC fines cyber firms for disclosure violations

The Last Watchdog

Related: Technology and justice systems The U.S. Avaya Holdings , Check Point Software Technologies , and Mimecast Limited each minimized or obscured the extent of security breaches linked to the SolarWinds Orion hack, impacting investor trust and highlighting the critical importance of clear, truthful communication.

CISO 263
article thumbnail

LW ROUNDTABLE — How 2024’s cyber threats will transform the security landscape in 2025

The Last Watchdog

Well see CISOs increasingly demand answers about why models flag certain malicious activity and how that activity is impactful at enterprise scale. While cloud offers flexibility, it introduces new cyber risks. That’s the easy part. The hard part? To avoid tool fatigue, organizations need integrated platform solutions.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Shifting from Business Continuity to Continuous Business in Cyber

Jane Frankland

A scenario where you could face any looming cyber crisis knowing that you’d emerge unscathed. As ITDMs, CISOs and cyber risk owners this is our dream scenario, and he got me thinking. This is a common misconception that has caught many ITDMs, CISOs and cyber risk owners out.

article thumbnail

Best Practices Q&A: Guidance about what directors need to hear from CISOs — from a board member

The Last Watchdog

CISOs can sometimes be their own worst enemy, especially when it comes to communicating with the board of directors. Related: The ‘cyber’ case for D&O insurance Vanessa Pegueros knows this all too well. She serves on the board of several technology companies and also happens to be steeped in cyber risk governance.

CISO 210
article thumbnail

LW ROUNDTABLE: Compliance pressures intensify as new cybersecurity standards take hold

The Last Watchdog

To mitigate risks, businesses will invest in modern, privacy-enhancing technologies (PETs), such as trusted execution environments (TEEs) and fully homomorphic encryption (FHE). Balonis Frank Balonis , CISO, Kiteworks By 2025, 75% of the global population will be protected under privacy laws, including U.S.

article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. Nation-states and geopolitical tensions are increasingly fuelling modern cyber threats.

article thumbnail

RSAC Fireside Chat: Tightened budgets impose discipline on CISOs, resets security investments

The Last Watchdog

CISOs have been on something of a wild roller coaster ride the past few years. Given carte blanche, many CISOs purchased a hodge podge of unproven point solutions, adding to complexity. Today, with purse strings tightened – and cyber risks and compliance pressures mounting — CISOs must recalibrate.

CISO 130