This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.
The Requirements By November 1, banks and other firms under the department's jurisdiction must demonstrate, among other requirements, that they must: Have a CISO who regularly reports significant cyber incidents to senior management.
We have heard countless times that, during the COVID-19 pandemic, digitaltransformation has advanced three years in three months. This affected all levels of the cybersecurity landscape, and it has had a particularly broad impact for those in the C-Suite, specifically, the Chief Information Security Officer (CISO).
Security information and event management systems — SIEMs — have been around since 2005, but their time may have come at last. Related: DigitalTransformation gives SIEMs a second wind After an initial failure to live up to their overhyped potential, SIEMs are perfectly placed to play a much bigger role today.
There is a gaping shortage of analysts talented enough to make sense of the rising tide of data logs inundating their SIEM (security information and event management) systems. Now toss in the fact that digitaltransformation is redoubling software development and data handling complexities. But this hasn’t done the trick.
After two years of virtual engagements, in-person events like our CISO Forum and Cisco Live as well as the industry’s RSA Conference underscore the power of face-to-face interactions. Digitaltransformation and Zero Trust .
Given how critical security is to digitaltransformation and our ability to innovate, we’ve got a robust line-up of cybersecurity topics – from SASE to zero trust and the technologies you need to help protect your business. Event is FREE! And it’s jam-packed with cybersecurity talks! Speaker: Rupesh Chokshi.
It is tempting for CISOs and CIOs to succumb to the “shiny toy” syndrome: to buy the newest tool claiming to address the security challenges facing their hybrid environment. As an IT leader, finding the tool that meets this requirement is not always easy. To read this article in full, please click here
CISOs, CIOs, and CFO should take the rest of Q4 2022 need to consider how the organization can reshape its security strategy for 2023 and adjust its “goal posts.”. Insure Risk is the Decision factor for DigitalTransformation Decisions. Organizations need more resources to sustain their SecOps events. Absolutely.
How would these events impact the ESG score? By having cybersecurity events impact the sustainability score of an organization? Data loss directly impacts the customer and business partners’ confidence in the organization for each security event. What is the role of the CIO and CISO in ESG? Absolutely.
In a presentation titled Digital governance for boards and senior executives: AI, cybersecurity, and privacy , she called on her extensive experience advising boards on these areas. Dr Lyons has spoken about this subject at major industry events, including the prestigious RSA Conference in San Francisco.
The pandemic has accelerated digitaltransformation for retailers and further shifted consumer buying habits online, which has expanded their attack surface and heightened the number of vulnerabilities and risks of a breach, said Casey Ellis, founder and CTO at Bugcrowd.
Beyond event logging, where is no established way to aggregate, correlate, and analyze this data, which exists within different departments, divisions, and management tools. Answering this question has placed CISOs on a path towards continuous audit readiness that’s accomplished by automating audit processes, from Scope to Evidence.
The Requirements By November 1, banks and other firms under the department's jurisdiction must demonstrate, among other requirements, that they must: Have a CISO who regularly reports significant cyber incidents to senior management.
In last year’s Cybersecurity Conversations Report , we discussed what the massive digitaltransformation resulting from 2020 meant for enterprise cybersecurity. But while there was a lot of attention and fear surrounding cybersecurity, the events of 2021 resulted in some really encouraging moments in our industry as well.
” SecurityScorecard CISO Mike Wilkes also noted the potential for malware and ransomware attacks to become much worse. “A near-future event could cause a massive depopulation of internet-connected devices. Cryptocurrency is the Wild West of the digital world today.
critical infrastructure services involving cyberattacks, counterintelligence, and crime," said VJ Viswanathan , Founding Partner, CYFORIX (former CISO and senior executive at Keurig Dr Pepper, Comcast, HD Supply, and GE). Halliburton's response to the incident is being closely watched by both the cybersecurity community and the energy sector.
Hacktivism also moved up the stack in 2020, disrupting events through social media. Defenses in 2020 The rapid shift to remote work this year propelled digitaltransformation, cloud adoption, and securing it all with zero trust principles. The classic distributed denial-of-service (DDoS) tactic is still in use. Well, it was.
The RSA Conference USA 2019 held in San Francisco — which is the world’s largest cybersecurity event with more than 40,000 people and 740 speakers — is a decent measuring stick for representation of women in this field. “At Director/CISO of IT Risk Management. Alexandra holds a B.S. Diane Brown. Ulta Beauty. Diane Brown is the Sr.
A recent survey by the Identity Defined Security Alliance (IDSA) questioned 500 identity and security professionals and examines the impact that these events have had on identity and access management in the enterprise and the implementation of identity-focused security strategies. Key findings. Scalability enabled by centralized management.
FBI Director Christopher Wray speaks at an event in Washington, D.C. A little more than a year ago I had the opportunity to interview 40 CISOs about their enterprise access challenges. Throughout 2020 many have marveled at the accelerated pace of digitaltransformation. FBI CreativeCommons (Credit: CC PDM 1.0).
For the past decade, companies have put customers at the center of their digitaltransformation, capturing ever more data to uncover new insights and better serve them with personalized experiences and compelling products and services. This morning, I actually posted about this event online on my social media sites.
This event is focused on the needs of senior IT and security professionals, such as CISOs, chief risk officers, architects, IAM and network security leaders. I was just reviewing last year’s trip report and thinking about how it was full of “IoT”, “Blockchain”, and of course “DigitalTransformation”. Back to basics.
The scaling of the cybersecurity landscape and organizations’ digitaltransformation projects drove the need for more significant cybersecurity investment priorities. The CISO also sets the direction security standards, which cybersecurity functions the organization will deploy, and align to all business priorities.
This year, we’ve written about what the future holds in terms digitaltransformations and new and exciting technologies. We’ve also addressed what key executives, especially CISOs, should be thinking about as data moves and is accessed across their organizations. Now, we turn our attention to best practices for data security.
critical infrastructure in the event of a major crisis or conflict” with the U.S. Critical Infrastructure And DigitalTransformation: A Risky Combination Campaigns like that aren’t new. Warnings about state sponsored actors sniffing around U.S. critical infrastructure go back more than a decade.
They are two different tools, each essential in their own way and critical for chief information security officers (CISOs) to keep their infrastructure safe. Despite their differences, both vulnerability scans and penetration tests are part of the wider vulnerability management framework or process.
Approachability and accessibility remain a top goal for this event. The advent of CI/CD, DevOps, and DigitalTransformation has rendered application security testing 1.0 Through education and networking, our goal is to make this advanced technique more approachable and accessible. At FuzzCon 2020, Mike Walker, Sr.
“The explosion in the number of human and non-human identities in the public cloud has become a security risk that businesses simply can’t ignore,” observes Eric Kedrosky, CISO at Sonrai Security. Human-to-machine connections comprise one level of the digital hook-ups fueling digitaltransformation.
Seven Cloud Security Predictions CISOs Can Use in 2022. Since hybrid work models and digital business models are here to stay, IT and security teams will need to rethink how they can better protect data to prevent data breaches in the future. Now, it’s time to right the ship.
Rogers made his remarks as part of a panel discussion on securing digitaltransformation moderated by Infosys CISO Vishal Salvi. This struck me as I roamed the vendor exhibits halls at RSA 2020 last week in San Francisco, and, again, this week at Infosys’ ribbon-cutting event in Indianapolis.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content