Remove CISO Remove Education Remove Technology
article thumbnail

LW ROUNDTABLE:  Predictive analytics, full-stack visualization to solidify cyber defenses in 2025

The Last Watchdog

To wrap up our 2024 year-end roundtable, we turn our attention to new technologies and trends that are emerging to help bridge the gaps. FIPS-203 enables legal PQC deployment, prompting CISOs to overhaul encryption strategies. We can expect security teams feeling pressure to adopt new technology quickly.

Risk 173
article thumbnail

Shifting from Business Continuity to Continuous Business in Cyber

Jane Frankland

As ITDMs, CISOs and cyber risk owners this is our dream scenario, and he got me thinking. It’s a subtle shift in focus, and requires a fundamental change in how we, as ITDMs, CISOs and cyber risk owners view and action resilience—not as a one-time project, but as an ongoing programme that provides strategic advantage.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How CISOs Can Impact Security for All

Cisco Security

Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.

CISO 118
article thumbnail

LW ROUNDTABLE: Compliance pressures intensify as new cybersecurity standards take hold

The Last Watchdog

To mitigate risks, businesses will invest in modern, privacy-enhancing technologies (PETs), such as trusted execution environments (TEEs) and fully homomorphic encryption (FHE). Balonis Frank Balonis , CISO, Kiteworks By 2025, 75% of the global population will be protected under privacy laws, including U.S.

article thumbnail

Hello, I am CISO Helen. Nice To Meet You :-)

Duo's Security Blog

Hello, I am Helen Patton, and I am the newest Advisory CISO at Duo. While I was a CISO at Ohio State we partnered with Duo to implement MFA across our organization. There is every type of technology under one institutional umbrella. I am told I am the inspiration for the “CISO Helen” persona. Duo is my next place.

CISO 121
article thumbnail

Sweet Treats, Sour Breach: Cyberattack Hits Krispy Kreme

SecureWorld News

Thankfully, customers can still visit physical stores to purchase their favorite treats, but the incident reminds us of our operational reliance on interconnected technologies. Regular Security Audits and Training: Identify vulnerabilities through audits and educate employees on cybersecurity best practices.

article thumbnail

You've Made the Ascent to CISO. Now What?

SecureWorld News

And now, you finally got that call, to be a CISO at an organization. Before diving into security strategies, CISOs need to invest time in understanding the organization's culture, strategic roadmaps, operational dynamics, industry, and so forth. Was there a previous CISO? You ' ve worked in the trenches.

CISO 111