This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Unisys, for instance, was found to have framed cyber risks hypothetically even though its systems had already been breached, exfiltrating gigabytes of data. But the SEC’s latest actions underscore that failing to inform stakeholders about material risks and breaches is not an option.
As I was spraying Pestiea DIY pest spray subscription servicearound my home this weekend (sun's out, spray gun's out), I was thinking about the correlation of this home perimeter defense to what CISOs and their teams do to keep their organizations secure. CISO takeaway: Effective cybersecurity isn't a generic solution.
Related: A call to regulate facial recognition That said, a few dozen CISOs attending Black Hat USA 2023 will get to experience, hands-on, what it must have been like to be in the crucible of milestone hacks like Capital One, SolarWinds and Colonial Pipeline. The Data Heist’s opening night, if you will, was in Boston a couple of weeks ago.
CISOs can sometimes be their own worst enemy, especially when it comes to communicating with the board of directors. She serves on the board of several technology companies and also happens to be steeped in cyber risk governance. LW: Why do so many CISOs still not get it that FUD and doom-and-gloom don’t work?
So how will this affect chief information security officers (CISOs) and security programs? Given the perennial skills and staffing shortage in security, it’s unlikely that CISOs will be asked to make deep budget or staffing cuts, yet they may not come out of this period unscathed. Related: Attack surface management takes center stage.
Shashanka Dr. Madhu Shashanka , Chief Data Scientist, Concentric AI Generative AI in 2025 will bring transformative opportunities but heightened cybersecurity risks, including data exposure, AI misuse, and novel threats like prompt injection attacks. FIPS-203 enables legal PQC deployment, prompting CISOs to overhaul encryption strategies.
Attending their annual global event series, SHIFT , in London recently, he redefined the future of business resilience in his keynote address and positioned the concept of continuous business—a ground-breaking state of perpetual availability and robustness which revolves around four pivotal elements: 1.
As the majority of the global Covid fog finally started lifting in 2022, other events – and their associated risks – started to fill the headspace of C-level execs the world over. In my role, I regularly engage with CISOs in all kinds of sectors, representatives at industry bodies, and experts at analyst houses.
Chief Information Security Officers (CISOs) across the Global 2000 and Fortune 1000 are obsessed with protecting the workforce endpoints as critical vulnerabilities in the cybersecurity and risk management posture of their enterprises. Should a risk-conscious, security-aware culture be considered a critical security control?
I’m delighted to announce the latest member of our growing CISO Advisor team, Pam Lindemeon. Pam is an exceptional leader; dedicated to advancing women in the IT industry, and I’m so glad she’s now joined Cisco to work closely with our community of CISOs and offer advice and guidance based on her incredible experience. Pam Lindemeon.
and its Chief CISO, Timothy G. The SEC accused SolarWinds of failing to adequately disclose cybersecurity risks and vulnerabilities, which allegedly misled investors about the company's security posture and internal controls. It emphasizes the importance of clear, accurate, and comprehensive risk factor disclosures.
Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.
Many of Gillis’s comments echoed those that I have heard in recent months from CISOs and others within the cybersecurity industry who witness developments from various vantage points quite different from those of a vendor of cybersecurity technologies. Sampling No Longer Works.
You've gone to events and dinners. And now, you finally got that call, to be a CISO at an organization. Can you balance the needs of the business, versus the risks they face? These resources should provide insights into the organization's risk appetite, technological maturity, and strategic objectives.
I’m delighted to announce the latest member of my CISO Advisors team, Bruce Brody. He was the first executive-level CISO at the Departments of Veterans Affairs and Energy, and has had more recent success as CISO at Cubic Corporation and DRS Technologies. Eventually, I became a CISO four times over. Bruce Brody.
In this blog, we’ll look at the root causes of concern for today's CISO and share some practical strategies to deter cybercriminals. The CISO role can be an unenviable one. Is the cyber deck stacked against today's CISO? If you own the risks, who owns the elimination? What about risk management?
It is a common feeling in the cybersecurity community that CISOs do not sleep well at night. CISOs worry about the latest incident, end of life technology in their environment, breaches in the news, insecure users and vendors, penetration testing results, budget and resources, and the latest vulnerability report (to name a few).
Implementing zero trust across the entirety of the technology stack would go a long way toward increasing resilience against events like this. This event, more than any other, is precisely why companies need a defense in depth strategy. Learning from this event can be critical to reducing the recovery time from major outages to come.
The Requirements By November 1, banks and other firms under the department's jurisdiction must demonstrate, among other requirements, that they must: Have a CISO who regularly reports significant cyber incidents to senior management.
This affected all levels of the cybersecurity landscape, and it has had a particularly broad impact for those in the C-Suite, specifically, the Chief Information Security Officer (CISO). So, what is an already over-stressed CISO to do? Clear responses to events. Building a Cybersecurity Platform for the Future.
Sam Masiello , CISO, The Anschutz Corporation: "I would expect that many CISOs today are feeling as if their job just got harder and now has a brighter spotlight shining specifically on them. Many CISOs are already burnt out, and there is shortage of qualified CISOs globally. CISOs are expected to be a unicorn already.
Mistakes online by one family member can lead to compromises in a household’s network, placing computers, personal data, and perhaps even work-related content at risk. Companies can promote family online safety with family-focused materials, events, and outreach. Host virtual events? Do you have a corporate book club?
The risks are real, and the impact of cybersecurity events continues to grow. A cyber catastrophe may seem inevitable, but there are basic practices and actionable steps any healthcare organization can take to begin reducing the clear and present risk of being impacted by a cybersecurity event. Evaluate data inventory.
Cybersecurity risks increase every year and bludgeon victims who fail to prepare properly. For those interested in a better understanding of the oncoming risks, this is the information you are looking for. It can feel like crossing a major highway while blindfolded. Many never see the catastrophe about to happen, until it occurs.
The invasion of Ukraine by Russia is reason enough for all CISOs to place their teams at a heightened state of alert and readiness in the event of deleterious cyber actions by nation-state actors or the cybercriminal groups.
I went through some of them this week at the Cyber Security Virtual Conference: Celebrating Women in Cyber, and with PWC Canada when they engaged me to open their one day event – SheProtects: Future CISO Program. She sees risk everywhere, is accountable for it, and is mostly at odds with the business. No one wants that!
A group of investors filed the suit which specifically calls out SolarWinds, its former CEO, and also Tim Brown, who is VP of Security and CISO. This week, SolarWinds fired back on the lawsuit's claims and accusations as it defended its CISO and its own cybersecurity actions in court. Summary of SolarWinds response to investor lawsuit.
You’re about to have your first Red Team experience, or maybe your first one in the CISO seat of your organization. It’s most common for a Red Team exercise to be an extremely limited knowledge event. Besides the debrief meeting and handing you deliverables, what’s next for a CISO after a Red Team exercise?
As of this writing, I’ve spent six months in the role of Chief Information Security Officer (CISO) at Axonius , a rapidly growing technology company. I’ve shared some of my lessons learned with a group of CISOs at a recent Bessemer Venture Partners event (that’s the photo at the top of this post).
The post How Cybersecurity Frameworks Can Protect Your Organization (Even in the Event of a Breach) appeared first on Hyperproof. The post How Cybersecurity Frameworks Can Protect Your Organization (Even in the Event of a Breach) appeared first on Security Boulevard. And if lost revenue and.
Cyber risk remains top of mind for business leaders A regular January fixture, the World Economic Forums Global Risk Report 2025 features two technology-related threats among the top five risks for the year ahead and beyond. The report ranks risks by severity over two-year and 10-year timeframes.
Become the Influence A NetSPI podcast, Agent of Influence features experts in the cybersecurity field as they engage in conversation with Nabil Hannan, NetSPI Field CISO and podcast host, about the life and challenges as a leader in cybersecurity. Join Nabil Hannan, NetSPI Field CISO, on the Agent of Influence podcast.
If I were starting over, I wouldn't spend years in school unless I had a very specific goal, like: Becoming a CISO or security executive (some companies still prefer degrees) Working in federal security or a government contractor role (many require one) Pivoting from a non-technical background (if I had zero IT/security knowledge) Otherwise?
Although there’s no one magic solution to eliminating cyberattacks and cybercrime risks, there are steps you can take to reduce the chances of becoming a victim. Cybersecurity and Infrastructure Security Agency (CISA) has started a campaign to increase awareness of these risks to U.S. businesses called #ShieldsUp.
So it's fitting that a recent SecureWorld webcast, sponsored by Spirion, tackles the topic of "Does ChatGPT Belong on Your Cyber Risk Register? CEO of Global Cyber Risk LLC, offers this advice: "You need to have a process for evaluating the risks associated with that technology, in this case Chat GPT. Some Legal Perspectives."
Often, CISOs see budget increases following a breach at their organization or in response to what is happening to industry peers. Security is often viewed as a cost center, necessary to keep the business afloat and to avoid costly events, but not generating profit. What drives cybersecurity spend and budget decisions?
About 15 years ago, the idiom began to be applied to cybersecurity, where the risk management continuum values the investment in protection to mitigate the negative consequences of a cyber incident. We can never eliminate risk entirely, but we can manage it effectively with “Left of Boom” processes and procedures. Right of Boom”.
Learn how to prepare and reduce the risk of the next ransomware event as Todd Inskeep, Founder at Incovate Solutions, walks us through the lessons learned after managing out of a NotPetya ransomware attack. The post CISO Stories Podcast: NotPetya – 45 Minutes and 10,000 Servers Encrypted appeared first on Security Boulevard.
If recent world events have driven an increase in the number of remote workers in your organization, you are now confronted by even more security challenges for already stretched security teams and busy IT departments.
Make it ADR-compatible When evaluating modern security information and event management (SIEM) solutions, prioritize those with robust integrations for Application Detection and Response (ADR). The post Cybersecurity Insights with Contrast CISO David Lindner | 11/8/24 appeared first on Security Boulevard.
SonicWall has just issued an urgent security notice detailing "critical risk" to some unpatched vulnerabilities on a couple of its products. SonicWall warns that organizations who fail to take appropriate action are "at imminent risk of a targeted ransomware attack.". x firmware are past temporary mitigations.
In 2023, Contrast Protect blocked 12 million legitimate attacks (including zero days such as the recent Confluence remote-code execution [RCE] vulnerability ) out of 4 billion detected attack events. The post Cybersecurity Insights with Contrast CISO David Lindner | 2/16/24 appeared first on Security Boulevard.
” This is the question every CISO asks about every new program. It’s hard to imagine a more vital undertaking for CISOs. And as with all initiatives, CISOs always want to know where to begin. Experienced CISOs know that these factors can make or break security initiatives. “Where do we start?”
Risk management: Cyber insurance policies often require a risk assessment, which can help an organization identify and address vulnerabilities and improve its cybersecurity posture. Cons of cyber insurance Cost: Cyber insurance can be expensive, particularly for organizations that are considered high-risk. Is it required?
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content