This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Related: Technology and justice systems The U.S. Avaya Holdings , Check Point Software Technologies , and Mimecast Limited each minimized or obscured the extent of security breaches linked to the SolarWinds Orion hack, impacting investor trust and highlighting the critical importance of clear, truthful communication.
Related: A call to regulate facial recognition That said, a few dozen CISOs attending Black Hat USA 2023 will get to experience, hands-on, what it must have been like to be in the crucible of milestone hacks like Capital One, SolarWinds and Colonial Pipeline. The Data Heist’s opening night, if you will, was in Boston a couple of weeks ago.
CISOs can sometimes be their own worst enemy, especially when it comes to communicating with the board of directors. She serves on the board of several technology companies and also happens to be steeped in cyber risk governance. LW: Why do so many CISOs still not get it that FUD and doom-and-gloom don’t work?
So how will this affect chief information security officers (CISOs) and security programs? Given the perennial skills and staffing shortage in security, it’s unlikely that CISOs will be asked to make deep budget or staffing cuts, yet they may not come out of this period unscathed. Related: Attack surface management takes center stage.
To wrap up our 2024 year-end roundtable, we turn our attention to new technologies and trends that are emerging to help bridge the gaps. FIPS-203 enables legal PQC deployment, prompting CISOs to overhaul encryption strategies. We can expect security teams feeling pressure to adopt new technology quickly.
Security information and event management systems — SIEMs — have been around since 2005, but their time may have come at last. Their capacity to ingest threat feeds is becoming more relevant with the rise of IoT (Internet of Things) systems and the vulnerabilities of old and new OT (operational technology).
I’m delighted to announce the latest member of our growing CISO Advisor team, Pam Lindemeon. At Anthem Pam was considered a bold and strategic thinker who envisioned and delivered a world class Enterprise Information Security strategy, including leading the Steering Committee with cross functional business and technology membership.
Attending their annual global event series, SHIFT , in London recently, he redefined the future of business resilience in his keynote address and positioned the concept of continuous business—a ground-breaking state of perpetual availability and robustness which revolves around four pivotal elements: 1.
With this in mind, Last Watchdog sought commentary from technology thought leaders about what the CrowdStrike outage says about the state of digital resiliency. Implementing zero trust across the entirety of the technology stack would go a long way toward increasing resilience against events like this. Time will tell.
Insights from our new Advisory CISO, Helen Patton. If there’s anyone who’s been put through their paces in the security industry, it’s Helen Patton , our new Advisory Chief Information Security Officer (CISO). Helen has come to Cisco from The Ohio State University, where she served as CISO for approximately eight years.
Many of Gillis’s comments echoed those that I have heard in recent months from CISOs and others within the cybersecurity industry who witness developments from various vantage points quite different from those of a vendor of cybersecurity technologies.
You've gone to events and dinners. And now, you finally got that call, to be a CISO at an organization. Before diving into security strategies, CISOs need to invest time in understanding the organization's culture, strategic roadmaps, operational dynamics, industry, and so forth. Was there a previous CISO?
This affected all levels of the cybersecurity landscape, and it has had a particularly broad impact for those in the C-Suite, specifically, the Chief Information Security Officer (CISO). So, what is an already over-stressed CISO to do? Technological update. Technological integration. Clear responses to events.
It is a common feeling in the cybersecurity community that CISOs do not sleep well at night. CISOs worry about the latest incident, end of life technology in their environment, breaches in the news, insecure users and vendors, penetration testing results, budget and resources, and the latest vulnerability report (to name a few).
I’m delighted to announce the latest member of my CISO Advisors team, Bruce Brody. He was the first executive-level CISO at the Departments of Veterans Affairs and Energy, and has had more recent success as CISO at Cubic Corporation and DRS Technologies. Eventually, I became a CISO four times over.
The risks are real, and the impact of cybersecurity events continues to grow. A cyber catastrophe may seem inevitable, but there are basic practices and actionable steps any healthcare organization can take to begin reducing the clear and present risk of being impacted by a cybersecurity event. Scheduling? Create an asset inventory.
Sam Masiello , CISO, The Anschutz Corporation: "I would expect that many CISOs today are feeling as if their job just got harder and now has a brighter spotlight shining specifically on them. Many CISOs are already burnt out, and there is shortage of qualified CISOs globally. CISOs are expected to be a unicorn already.
As of this writing, I’ve spent six months in the role of Chief Information Security Officer (CISO) at Axonius , a rapidly growing technology company. I’ve shared some of my lessons learned with a group of CISOs at a recent Bessemer Venture Partners event (that’s the photo at the top of this post).
Around the World with Thales: Our Upcoming Events madhav Thu, 09/28/2023 - 05:01 The summer is long gone, and we are all back to work. However, there will be plenty of opportunity for us all to catch up as the Fall season is bustling with cybersecurity events worldwide. Our event booth number is H25-C70.
With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. An integration with Cigent Technology is now available for Secure Endpoint customers to integrate with. Kenna has a healthy 3rd Party ecosystem of technology partners.
Thanks to technology, continual rapid change is here to stay. I went through some of them this week at the Cyber Security Virtual Conference: Celebrating Women in Cyber, and with PWC Canada when they engaged me to open their one day event – SheProtects: Future CISO Program. For years we’ve known it was coming, what Industry 4.0
In a world that pushes the limits with technology comes an increase in the relentless persistence of cyberattacks and we need to be prepared. Complete the short survey to tell us about yourself, the topics you’re passionate about, and which upcoming events you plan to attend. Interested in becoming a guest on Agent of Influence?
Chief Information Security Officers (CISOs) across the Global 2000 and Fortune 1000 are obsessed with protecting the workforce endpoints as critical vulnerabilities in the cybersecurity and risk management posture of their enterprises. These actions and their potential for disaster cause CISOs to greet every day with an anticipatory grimace.
Many technology workers will resign from their comfortable, high-paying jobs at larger employers. CISO shortage. CISO exodus. Chief Information Security Officers (CISOs) have a rare combination of business acumen, operational knowledge, technical insights, and legal/compliance experience.
John Masserini, of Tag Cyber, will explore practical approaches to advancing zero trust along with his fellow panelists: Kevin Dana, VP of Information Technology for World Wide Technology; Marcos Christodonte II, Global CISO for CDW; and Allen Jeter, Director of IT for Chainalysis.
While you might think that these actors are interested in government and defense information, their operations prove they are interested in much more – including software development and information technology, data analytics, and logistics. which supplies ultra-sensitive, portable marijuana breathalyzer technology.
The pre-COVID-19 CISO. The global COVID-19 pandemic has been a tumultuous time for Chief information security officers (CISOs) who on any given day have a long and complicated list of responsibilities. When employees click on the link, recipients are not immediately getting the page on their browser or in their device.
GFCyber is an independent, nonprofit, and non-partisan think tank that helps policymakers address societal challenges created by contemporary technology. It is a collaborative step in the direction that aims to dissect and address the cyber policy and technology issues prevailing in the modern hyper-connected world. About GFCyber.
Cyber risk remains top of mind for business leaders A regular January fixture, the World Economic Forums Global Risk Report 2025 features two technology-related threats among the top five risks for the year ahead and beyond. MORE eBays CISO shares his thoughts on planning and security ROI.
It was a great event," said Paul Dial, CISO of AECOM, who was part of a closing keynote panel on "CISO: Chief in Name Only." "It It has been years since I attended a SecureWorld event. The panel was artfully moderated by Dd Budiharto, CISO, Advisory Board Member, and Founder of Cyber Point Advisory, a vCISO firm.
Today, most CISOs in the enterprise space have decades of experience. Here’s the reality though: even the most seasoned CISO needs help with what’s next. Here’s the reality though: even the most seasoned CISO needs help with what’s next. So, what does this mean for you as a CISO? Join us on February 23rd .
Technology oversight is a common mandate across IT and security frameworks and compliance specifications, but achieving that oversight is difficult. First, technology and operational intelligence, across the myriad of users, endpoints, applications and infrastructure, is siloed and fragmented. By Scott Gordon, CISSP, Oomnitza .
About our CISO Advisor team. I lead Cisco’s global CISO Advisors team, a group of security leaders dedicated to lending our experience to all different kinds of organizations across the world. For us, it’s about supporting other CISOs and security leaders to be the very best version of themselves at their jobs. How we can help.
Cisco Security was honored to be a sponsor of the 24th Black Hat USA 2021 Conference – the internationally recognized cybersecurity event series providing the security community with the latest cutting-edge research, developments and training. Read on for details…. ” -Wendy Nather. Don’t Set It and Forget It.
The primary job of the Chief Information Security Officer (CISO) is to exercise continuous diligence in reducing risk, within the risk appetite and risk tolerance of the organization, so that the likelihood of a boom is low, and the corresponding magnitude of harm is limited. Some “Left of Boom” Processes. Frameworks.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. Michael Gregg is the CISO for the State of North Dakota. He was voted one of the top 100 CISOs for 2023, has been invited to the White House, has testified before the U.S. A : Changing U.S.
Often a combination of disruptive technologies, lagging risk behavior trends, shifts in threat actor capabilities or focus, greater expectations for cybersecurity, and new regulatory structures emerge to wreak havoc. There is a method to the madness of trying to forecast such a complex and muddled industry. In 2024: 1.
According to Cisco’s Head of Advisory CISOs, Wendy Nather , “After the scramble and confusion of 2020, organizations will opt for a period of quiet in the security realm. CISOs will simply try to hold on to what they have.”. With this reality in mind, how should security teams proceed now that we’re in the new year?
Attorney General Bonta discusses the settlement: "Technologies like the Global Privacy Control are a game changer for consumers looking to exercise their data privacy rights. But these rights are meaningless if businesses hide how they are using their customer's data and ignore requests to opt-out of its sale.
The latest edition of CyberTalks, the largest annual gathering of CISOs and cyber leaders, was held on June 15-16, and attracted thousands of virtual attendees from government, technology, finance, and medical sectors. During these unprecedented times, the necessity to come together was more urgent than.
With a lineup of expert speakers, interactive workshops, and cutting-edge technology on display, it was a must-attend event for anyone interested in staying ahead of the latest threats and trends in the industry. Our second keynote of Day 1 was given by the eccentric Chris Roberts, CISO of Boom Supersonic.
The painful impact of cyber attacks on businesses is worsening despite advances in technology aimed at protecting enterprises from malicious network traffic, insider threats, malware, denial of service attacks and phishing campaigns. This has left many CISOs questioning if today’s incumbent cybersecurity solutions are enough.
Real-world case studies Explore examples of how diverse organizationsincluding critical infrastructure, technology companies, and government agenciesleverage the CSF. See our Events schedule here. Diving into the Framework Gain a detailed understanding of the Framework Core, Tiers, and Implementation Profile.
In the SecureWorld Spotlight Series, we learn about the speakers and Advisory Council members that make our events a success. For the past 25 years, he has resided in Boulder, Colorado, and calls the Rockies home when he is not flying to or from a security event or conference in some distant part of the world.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content