This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. Many CISOs are already burnt out, and there is shortage of qualified CISOs globally.
I'm pretty late doing this week's video as the time has disappeared rather quickly and I'm making the most of it before the next round of events. I explain the problem in this video along with a bunch of other infosec related bits. see why Splunk's CISO says "strongDM enables you to see what happens, replay & analyze incidents.
Many of Gillis’s comments echoed those that I have heard in recent months from CISOs and others within the cybersecurity industry who witness developments from various vantage points quite different from those of a vendor of cybersecurity technologies.
The post BSides Tampa 2021 – CISO Panel ‘John Burger, Guy Albertini, Michael Phillips, Barry Kortekas, Jon Sargent’ appeared first on Security Boulevard. Our thanks to BSides Tampa for publishing their outstanding videos on the organization's YouTube channel. Enjoy the Education!
CISO shortage. CISO exodus. Chief Information Security Officers (CISOs) have a rare combination of business acumen, operational knowledge, technical insights, and legal/compliance experience. The net result will be less employment opportunities and eventually less job-hoping in 2023 despite the talent shortfall in IT security.
They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect […] The post Alyssa Miller: Charting the Course Through InfoSec and Aviation appeared first on Shared Security Podcast.
Managing the volume of security events and continuous threat intelligence can be daunting for the largest of organizations. Ricardo Lafosse, CISO at Kraft Heinz, explains - check it out. The post CISO Stories Podcast: Who is Your SOC Really For?
Designate a qualified individual (CISO or equivalent) responsible or overseeing and implementing a cybersecurity program and enforcing its cybersecurity policy. Require the CISO to provide a written report at least annually to the board or equivalent governing body. Have Infosec certifications and passion for #cyber and #dataprivacy.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. He has been a first-hired CISO at five different companies. A : When I was with Bright Horizons, many top-tier clients demanded InfoSec competence. I learned from them. I learned from them.
The post BSides Tampa 2021 – Sallie Wright’s ‘The Evolving Role Of The CISO And The Security Organization’ appeared first on Security Boulevard. Our thanks to BSides Tampa for publishing their outstanding videos on the organization's YouTube channel. Enjoy the Education!
Regardless of the changes, the conference is still one of Duo’s favorite events, and we’re excited to attend! Ask three infosec pros and you’ll get three different answers. PT Duo Head of Advisory CISOs Wendy Nather will be hosting live discussions on Tuesday, May 18 from 12:45 - 3:40 p.m.
The post DEF CON 29 Cloud Village – Wes Lambert’s ‘Onions In The Cloud Make The CISO Proud’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their tremendous DEFCON Conference Cloud Village videos on the groups' YouTube channel.
After two long years away from in-person events, the renewed energy at our SecureWorld conferences is palpable. Attendees, speakers, and exhibitors alike warmly embraced their peers and longtime conference friends at our Boston and Philadelphia events this month. Our 18th annual Boston event was a much-needed breath of fresh air.
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape. Buerger recently joined Kraft Heinz as its Business Information Security Officer after serving as CISO at a smaller company.
This nonstop barrage of security crises has made certain infosec leaders and practitioners more aware than ever of the job’s impact on mental healthy, and the importance to protect against stress, exhaustion and burnout. Corll said he closely interacts with about 20 other CISOs through the U.S.-based But how have they been managing?
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. My goals in InfoSec are similar: to teach the organization how to protect itself. A : Word of mouth and an opportunity to be involved from the ground up in establishing an InfoSec team at a law firm.
But infosec thought leaders say that blaming an intern ignores the true roots of the problem, including insufficient credentials policies and access management practices – as evidenced in part by the simplicity of the password itself: “solarwinds123”. “All Infosec experts similarly chided the company for a lack of strong credentials.
Leighton has some real admiration for the Ukraine government and the host of supporters across the world—including 200,000 InfoSec practitioners aiding in Ukraine's cyber efforts—for not just battling Russia, but winning in many instances. To watch the full presentation, check out the event's agenda and register today.
You really had to be there to soak in everything discussed between speakers, attendees, and our sponsors, but if you were unable to attend for some reason, we've got you covered with highlights from the event. The event kicked off with an opening keynote led by U.S. So be sure to check out our events page and register today !
The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. Resilience protocols and measures must be designed to ensure business continuity and operational service assurance in the event of a breach. This greatly increases the attack surface for enterprises.
But while there was a lot of attention and fear surrounding cybersecurity, the events of 2021 resulted in some really encouraging moments in our industry as well. CISOs and infosec professionals are finally getting a seat at the table at an executive and board level. Adapt your program to embrace the constant change. ?
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. Bryan Bechard is CISO for Flagship Credit Acceptance. He has been working in cybersecurity for the last 20 years and teaching the next generation of InfoSec pros.
For example, outcomes like adapting to external events, creating a security culture, and cost-effective programs, all improve when organizations make progress towards zero trust security (based on survey responses from 4,751 active information security and privacy professionals from 26 countries). What are the outcomes your team is seeking?
The post BSides Tampa 2021 – Larry Whiteside’s ‘So You Wanna Be A CISO … Are You Sure?’ Our thanks to BSides Tampa for publishing their outstanding videos on the organization's YouTube channel. Enjoy the Education! ’ appeared first on Security Boulevard.
I think it requires taking a step back and assessing what you can do with less," said Chris Roberts, CISO and Senior Director at Boom Supersonic. Andrew Smeaton, CISO at Afiniti, says reassessment of cybersecurity programs and plans is necessary. Too many folks focus on the technology as opposed to the people or process.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. Randy is a CISSP and is active in the Central Missouri InfoSec community. In this installment, we introduce you to Randy Raw. Get to know Randy Raw. See the conference agenda and register here.
This is an industry still struggling with elevated anxiety levels following the events of the past eighteen months. Similarly, a quarter of CISOs said that their job has affected their mental and/or physical health, as noted by Cyberscoop. Helen Patton | Advisory CISO at Cisco.
The certificate program will offer hands-on experience with industry standards and tools, including Python, Linux, and security information and event management (SIEM). CISOs have praised the certificate program, stating that they would regard it as a proper qualification for entry-level roles.
The post BSides Tampa 2021 -Michael Melore’s, Hussein Syed’s, Charles Gagnon’s And Timothy Swope’s ‘CISO Panel, Managing Organizational Risk During A World Pandemic’ appeared first on Security Boulevard. Enjoy the Education!
Yes, insurance companies may with certain policies they offer demand a bare minimum in cybersecurity/infosec mitigation tools and solutions,” he said. “It Others factors will increase pressure on strengthening cybersecurity, too, as will unexpected events like, for instance, a global pandemic. But much will rely on regulation.
We constantly see new threats, and threat vectors, come and go; which puts a tremendous strain on the InfoSec teams that have to protect organizations and businesses from these threats. This integration collects all Secure Endpoint event data via the streaming API, for correlation or other uses. Read more here. Read more details here.
In the past, fake social profiles were relatively easy to spot, however in the case of DPRK, the cybercriminals spent time to setting up a profile, get hooked up into the infosec scene, gain followers and connections through LinkedIn, making it more difficult than before to detect a fraudulent account. Techniques & Tactics.
At SecureWorld, we consider all of our Advisory Council members—the CISOs, BISOs, and senior leaders who help us plan each of our 15 in-person conferences—to be true cyber heroes. We celebrate their contributions to InfoSec, elevating everyone in the cybersecurity profession—today's heroes.
Ransomware has become one of the most dangerous and high-profile problems facing CIOs and CISOs worldwide. The threat actor claimed to have hacked into T-Mobile’s production, staging, and development services two weeks prior to the event, including an Oracle database server containing customer data, sources told the Bleeping Computer.
The publication outlines the three areas in cybersecurity where the engineers believe that ML helps most significantly: Network intrusion detection/security information and event management (SIEM) solutions : Keeping an intrusion detection system (IDS) up to date can be a manual and time-consuming process.
In the words of Duo Security’s Head of Advisory CISOs Wendy Nather, “This is not a marketing report to toss in your swag bag and ignore …this report will change how we think about running infosec programs.” Any events will be strictly virtual, for one thing. Data Privacy Day with a difference.
Aside: how on Earth can today's politicians justify holding a climate change conference as a physical, in-person event, during COVID no less, rather than virtually, on-line? so, how things going with your security strategy development, dear CISO? Are we even on the same planet? Shakes head in disbelief.]
Digital Guardian Chief Technology Officer Debra Danielson gives a talk at the 10th anniversary of the Grace Hopper India event in 2019. So as you both look around and see the experiences of other women in infosec today, do you feel like the opportunities have improved? Digital Guardian). I figured people would remember me.
This month, we interviewed Esmond Kane, CISO of Steward Health Care. First of all, while I am honoured and deeply thankful for the recognition, I believe strongly that Security is a team effort and I must acknowledge the superb InfoSec team in Steward but also the Steward workforce. Esmond Kane is Cisco’s CISO of the month.
As 2023 draws to an end and cybersecurity budgeting is nearly complete, it helps to consider the year’s events and try to predict next year’s trends. Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. Dd (Catharina) Budiharto is the founder of Cyber Point Advisory LLC, a fractional CISO firm providing cybersecurity advisory services to small and mid-size businesses (SMBs). A : Zero Trust Until Verified.
Vamos i That day in 1993, six people died and the event was front page news for weeks. Vamos i I realized this isn't the typical InfoSec opening for The Hacker Mind but it is an important backstory for this episode's guest. They're both honored and 10 stories. People are being evacuated from both buildings. Around companies, right?
When we consider all the various professional “breach investigation” reports and “institute” findings of the last few years, many of them remark about the “dwell time” of a cyber incident, that is, how long the attackers remained undetected in a system prior to the discovery of the breach event.
Ransomware attacks may even be timed to coincide with quarterly earnings announcements or other events.”. Tyler Farrar, CISO, Exabeam. History shows when those things happen there tends to be an event that triggers an avalanche. Infosec will dominate our lives in the tech space for the foreseeable future.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content