This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Last week, I attended an excellent briefing given by Tom Gillis, Senior Vice President and General Manager of VMware’s Networking and Advanced Security Business Group, in which he discussed various important cybersecurity-related trends that he and his team have observed.
One of our memes was reposted by The Cyber Security Hub, an infosec community with greater than 1 million (yes, it’s MILLION) followers on LinkedIn. The meme (see below) was on the topic of cybersecurity budgets and it was our tongue-in-cheek way to start a discussion. But we were blown away by the response it ….
Love may be in the air for all in the month of February, but for us infosec folks there are a lot of other, less desirable things also floating over the air waves (I mean networks, internet, …). While I usually write informative articles for CISOs and cybersecurity pros, there’s just something about this time ….
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Mário João Fernandes, born and raised in Mozambique, has been working in the banking sector for 29 years and has been fulfilling dedicated security roles in the cybersecurity space for over 11 years.
Even if you’re just starting your cybersecurity career, you may already be thinking about the top job in the field, Chief Information Security Officer. And it’s not too early to start — for example, with Springboard ’s cybersecurity bootcamp that guarantees you a career in cybersecurity or your tuition back.
Kerissa joins the show to discuss the cybersecurity skills shortage and her initiative to recruit brilliant minds from across an array of fields who have skill sets applicable to cybersecurity, but they might not even know it - check it out.
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. Currently, many public companies provide cybersecurity disclosure to investors.
The post CISO Stories Podcast: No Insider Cybersecurity Risk? What happens when an employee decides to leave the organization and start their own business – but with your Intellectual property or customer lists? . Guess Again! appeared first on Security Boulevard.
Rafal Los, host of the popular Down the Security Rabbithole Podcast, joins us to discuss CISO liability risk and the ongoing discussion in the cybersecurity community about CISOs going to jail.
CISO shortage. CISO exodus. Chief Information Security Officers (CISOs) have a rare combination of business acumen, operational knowledge, technical insights, and legal/compliance experience. The post Five 2023 Cybersecurity Predictions by Doug Dooley appeared first on Cybersecurity Insiders.
Information security (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency due to the primary business risk it presents. The post Assessing Third-Party InfoSec Risk Management appeared first on Security Boulevard.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison appeared first on The Security Ledger with Paul F. Dustin Hutchison is CISO at Pondurance. Click the icon below to listen.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson appeared first on The Security Ledger with Paul F. Dustin Hutchinson is CISO at Pondurance. Click the icon below to listen.
The post InfoSec Reviews in Project Management Workflows appeared first on Security Boulevard. I agree – this is very important. But there’s one topic that does not get.
Securities and Exchange Commission (SEC)began enforcing new cybersecurity disclosure rules. In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance. Recognizing the critical need for transparency and robust cybersecurity measures, the U.S.
One of the notable sessions at the SecureWorld Philadelphia conference, April 19-20, was a podcast recording featuring three prominent Philadelphia area cybersecurity experts, in a session titled, "CISOs Riff on the Latest in Cybersecurity. Glanden serves up the specialty cocktail of the day, the "CISO."
In 2020, we saw cybersecurity move from a technical problem to become a business enabler. Data from the current AT&T Cybersecurity Insights Report shows that 5G technology is being driven by the line of business and has been siloed between IT and OT organizations. The report will be published in January 2022.
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. This phenomenon is not just anecdotal; several studies have highlighted the alarming prevalence of burnout in the cybersecurity industry.
With the intense competition from the industrys best, this award underscores our dedication to setting new standards in cybersecurity. With these scalable and reliable PAM solutions , organizations of all sizes can address their complex and ever-evolving cybersecurity challenges. Ackerman Jr.
They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect […] The post Alyssa Miller: Charting the Course Through InfoSec and Aviation appeared first on Shared Security Podcast.
InfoSec leaders tend to be a specific type. The high-stakes position also means that CISOs need to keep their knowledge and skills sharp – you can never really know what's around
The post Reducing InfoSec Threats Takes a Village appeared first on Security Boulevard. Chief executive officers and chief technology officers know this is a potentially existential threat both for their companies and for them professionally. As a result, executives are looking to.
We hear it all the time: there are not enough people to fill all the cybersecurity roles (including CISOs) that are currently available, not to mention the openings expected in the coming months and years. Being a CISO sometimes serves as the catalyst to finding a new career path.". People want: Work-life balance.
Working in cybersecurity can be awfully stressful these days. We've come across a lot of cybersecurity memes here at SecureWorld, and a few always seem to pop up during presentations at our regional cybersecurity conferences. Here are some of the most amusing ones InfoSec memes we've seen. Top 10 cybersecurity memes.
Ira Winkler, CISO at Skyline Technology Solutions, recounts his amazing journey from wannabe astronaut to NSA intelligence analyst, social engineer, systems hacker and author, and some of the crazy things that happened along the way - check it out. The post CISO Stories Podcast: So You Want to be a Cyber Spy?
As 2023 draws to an end and cybersecurity budgeting is nearly complete, it helps to consider the year’s events and try to predict next year’s trends. After receiving input from industry experts and doing my own analysis of the year’s driving forces, I identified five major cybersecurity trends. Bottom line: Prepare now based on risk.
Are you curious what threats other CISOs are prioritizing right now? Hundreds of Cybersecurity professionals recently responded to MixMode’s nation-wide survey on InfoSec strategies for the end of 2022. The post Webinar: State of InfoSec Q3 2022 appeared first on Security Boulevard.
In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. He has been a first-hired CISO at five different companies. Get to know Bill Bowman Q : Why did you decide to pursue cybersecurity as a career path?
. “If it is not technically possible to remediate the vulnerability, or if remediation is cost prohibitive, the [employee] and their management must contact Information Security to obtain a waiver or risk acceptance approval from the CISO,” the SEC explained. That inquiry is ongoing.
Infosec skills don’t necessarily transfer to CISO skills, but CISO skills are 100% transferable to whatever your infosec career looks like. The post CISO Stories Podcast: Skills I Needed to be a First-Time CISO appeared first on Security Boulevard.
Building a security awareness training program to develop a strong infosec culture requires time and money, and chief information security officers frequently try to make a case for such an investment by citing return on investment and other metrics of success. This is evidence you can take to your CISO to get the funding you need.”.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Dmitriy Sokolovskiy has been working in the cybersecurity space for over 14 years in dedicated security roles, in addition to 9 more years working in various IT areas.
Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. In an interview with SecureWorld News , Arun DeSouza shares his insights on the challenges and emerging trends in the cybersecurity sector and modern ways to adapt to the changing business landscape.
The post BSidesAugusta 2021 – Russell Eubanks’ ‘4 Keys You Must Have to Be A Successful CISO’ appeared first on Security Boulevard. Many thanks to BSidesAugusta for publishing their outstanding videos from the BSidesAugusta 2021 Conference on the organization’s YouTube channel.
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape. Well, information security, cybersecurity happens to be a critical part of the business, being able to achieve strategic objectives.
In Q&A format, they share about their professional journeys, unique experiences, and hopes for the future of cybersecurity—along with some personal anecdotes. Get to know Steve Naphy Q : Why did you decide to pursue cybersecurity as a career path? Q : How would you describe your feelings about cybersecurity in one word?
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. The post Hi-5 With A CISO <br><br> Piotr Stecz, Adamed Pharma appeared first on CybeReady. The post Hi-5 With A CISO <br><br> Piotr Stecz, Adamed Pharma appeared first on CybeReady.
The New York State Department of Financial Services (NYDFS) is proposing an amendment to its regulations that will require financial services companies to up their cybersecurity game. Designate a qualified individual (CISO or equivalent) responsible or overseeing and implementing a cybersecurity program and enforcing its cybersecurity policy.
Now, those insurers are poised to drive cybersecurity investment by insisting that organizations meet certain criteria to qualify for coverage. Still unclear is whether this will serve the cybersecurity community well, or distort strategies to protect data and networks. billion in 2019, according to Hiscox – companies crave coverage.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Andrea Szeiler has been working in the cybersecurity space for over a decade. The post Hi-5 With A CISO <br><br> Andrea Szeiler, Transcom appeared first on CybeReady.
The information security industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts. The post Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s Challenges appeared first on The.
Since 2011, I’ve consistently spoken, and written about the dangers of burnout in cybersecurity, and proposed leadership strategies for employee wellbeing. In this blog, and ahead of my talk at Infosec this week , I’m delving into this, and giving you tips for recognising its signs and preventing it as a leader.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content