This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Vincent Hoang became the CISO in Hawaii in 2016. In this interview, Vince shares his journey and cyber priorities in protecting the Aloha State, particularly among the challenges presented by COVID-19.
Someone has recently created a large number of fake LinkedIn profiles for Chief Information Security Officer (CISO) roles at some of the world’s largest corporations. It’s not clear who’s behind this network of fake CISOs or what their intentions may be. Of course, Sites is not the real CISO of Chevron.
Prosecutors charged Sullivan, whom Uber hired as CISO after the 2014 breach, of withholding information about the 2016 incident from the FTC even as its investigators were scrutinizing the company’s data security and privacy practices. Joe Sullivan, Uber’s CEO during their 2016 data breach, is appealing his conviction.
According to prosecutors, Sullivan broke multiple laws when he failed to disclose the subsequent breach to government regulators; a federal jury in San Francisco consisting of six women and six men yesterday convicted him of two crimes: obstructing the FTC’s investigation and acting to conceal a felony from authorities. Click To Tweet.
National insurance firm Crum and Forster is offering a professional liability program for CISOs who are facing growing regulatory pressures and sophisticate cyberattacks but often are not covered by their organizations' D&O policies. The post Insurance Firm Introduces Liability Coverage for CISOs appeared first on Security Boulevard.
A leading cyber lawyer in Australia has warned CISOs and other IT leaders their organisations and careers could be at stake if they do not understand data risk and data governance practices.
CISOs can sometimes be their own worst enemy, especially when it comes to communicating with the board of directors. She serves on the board of several technology companies and also happens to be steeped in cyber risk governance. LW: Why do so many CISOs still not get it that FUD and doom-and-gloom don’t work?
The role of a Chief Information Security Officer (CISO) is undeniably complex, yet incredibly rewarding. However, the challenges faced by CISOs are mounting, exacerbated by the evolving threat landscape and regulatory environment. These incidents underscore the critical importance of effective governance in cybersecurity programs.
The Chief Information Security Officer (CISO) is the organization’s senior executive in charge of the cybersecurity and the information technology risk management posture of the enterprise. federal government in particular, the CISO reports to the Chief Information Officer (CIO). In many organizations, and in the U.S.
Mentioning the phrase “shadow IT” to CISOs often results in an eye-roll or a grimace. As one who spent most of his adult life within government dealing with home-based IT capabilities that far outstripped those in the office, I know this feeling. Sign up for CSO newsletters. ].
Chief Information Security Officer (CISO) Luis Gonsalves, Head of Security for Portugal’s central bank, and founder of the Cloud Security Alliance’s Portugal Chapter, says Certified Cloud Security Professional (CCSP) stands out from other technical certifications. That’s the real differentiator ,” he says. Read the Full Article.
Guess which CISOs tend to prioritize? Thats why a group of us, led by Evan Lam and Sudheesh Singanamalla, have a new short paper* in NDSS, On the (In)Security of Government Web and Mail Infrastructure : Abstract: Government web infrastructure is a critical part of todays Internet and the functioning of society.
The role of the CISO has evolved, and so have the responsibilities. Some believe a CISO must have technical knowledge and experience as a cybersecurity professional, others think leadership skills such as being able to communicate with boards are what matters most. To read this article in full, please click here
Do you have control of your information in each country, or does the government also have access (and control) of your data? There is no one-size-fits-all set of rules and therein lays the conundrum for CISOs, especially those whose customer base or digital infrastructure crosses political boundaries.
The post Cybersecurity Insights with Contrast CISO David Lindner | 03/14/25 appeared first on Security Boulevard. Clinging to outdated tools isnt just risky its a fast track to breach headlines. The choice is clear: Evolve to ADR or get left behind in the wreckage. Your move, tech world.
government. This means that thousands of government contractors will soon be required to implement structured processes for identifying, reporting, and mitigating vulnerabilities, aligning them with U.S. government and among the many contractors and vendors that support federal agencies."
These are all very real situations for today’s CISO. One CISO cannot be everywhere all the time and engage meaningfully with all these groups. The Deputy CISO role isn’t just good for your team and your organization. Characteristics of a great deputy are simple… what makes you a great CISO?
I’m delighted to announce the latest member of our growing CISO Advisor team, Pam Lindemeon. Pam is an exceptional leader; dedicated to advancing women in the IT industry, and I’m so glad she’s now joined Cisco to work closely with our community of CISOs and offer advice and guidance based on her incredible experience. Pam Lindemeon.
This is why CISOs everywhere should be concerned. Government secrets: Classified information, military secrets, or other sensitive government information that can be used for espionage. CISOs should begin to familiarize themselves with these and evaluate their potential suitability for adoption.
There are a range of distinct roles/missions that hold the CISO title. The post Different Types of CISOs, Diverse Missions appeared first on Security Boulevard. Their ultimate goals are similar, but how they are positioned to do that varies.
Steinberg, who serves as a cybersecurity expert witness, a cybersecurity advisor to both businesses and governments, and a popular columnist, has led organizations within the cybersecurity industry for over two decades. Steinberg brings important insights about cybersecurity, privacy, and artificial intelligence to this community.”.
And now, you finally got that call, to be a CISO at an organization. Before diving into security strategies, CISOs need to invest time in understanding the organization's culture, strategic roadmaps, operational dynamics, industry, and so forth. Was there a previous CISO? You ' ve worked in the trenches.
The indictment of the SolarWinds CISO by the SEC served as a harsh wake-up call to the corporate world. The post What the Charges Against the SolarWinds CISO Mean for Security in 2024 appeared first on Security Boulevard.
Enterprises must secure AI agents, adopt proactive data governance, and deploy AI-based security platforms. FIPS-203 enables legal PQC deployment, prompting CISOs to overhaul encryption strategies. Collaborative efforts between security vendors, AI providers, and businesses will be key to counter automated, scalable attacks.
From a governance standpoint, Agnidipta Sarkar, Vice President of CISO Advisory at ColorTokens, emphasizes the critical role of regulatory frameworks. In his view, prolonged breach response times often indicate inadequate data governance and limited internal controls. Maybe the healthcare industry needs a similar regulation."
Some CISOs, at first, were reserved and said, ‘We’re not moving to the cloud.’ Nasser: It’s one of two things, when the legal department comes in, or the government comes in, and there’s a conversation around regulation and privacy. So if you’re a Microsoft shop, you’re on an Office 365 and a Windows 10 migration path.
On January 11, 2023, presiding United States District Judge William Orrick in San Francisco denied the motion of Joe Sullivan, the former CISO of Uber, for a judgment of acquittal. The post Former Uber CISO Conviction Affirmed by Trial Court appeared first on Security Boulevard.
Just like pilot awareness is crucial during unexpected aviation events, cybersecurity's traditional focus on infrastructure needs to shift to more adept governance. The post Cybersecurity Infrastructure Investment Crashes and Burns Without Governance appeared first on Security Boulevard.
A survey of IT security pros by cybersecurity firm BlackFog found that 70% of them said federal cases like that against SolarWinds' CISO hurt their opinion about the position, but some said they expected the boards of directors would take the issues of security more seriously.
But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. Amid a backdrop of increasingly sophisticated and frequent cyberattacks, APTs are a growing concern for CISOs and cyber risk owners.
Their Unified Identity Security Platform brings togetheridentity and access managementsolutions:Identity Governance and Administration (IGA), Access Management (AM), Privileged Access Management (PAM), andActive Directory Management (AD Mgmt)capabilities to enable organizations to shift from a fragmented to a holistic approach to identity security.
and its Chief CISO, Timothy G. government agencies and Fortune 500 companies. The case highlights the critical role of CISOs and other cybersecurity leaders in maintaining transparent and effective security practices. Securities and Exchange Commission (SEC) against SolarWinds Corp.
Have you started pulling together information for the government’s requirement of self-attestation as to the security practices you follow in your SDLC for any software used or purchased by the U.S. federal government? The post Cybersecurity Insights with Contrast CISO David Lindner | 3/3 appeared first on Security Boulevard.
In a sentencing memorandum filed with a San Francisco federal court on April 27, 2023, prosecutors argued that Joe Sullivan—the former CISO of Uber and a former federal computer crimes prosecutor himself (with the same office)—should serve 15 months in federal prison for his role in the ride-sharing company’s concealment of a data breach.
Treasury Department breach as a warning: “A single leaked API key from BeyondTrust allowed attackers to infiltrate government systems. “For CISOs and security leaders, the goal isn’t just detectionit’s the remediation of these vulnerabilities before they’re exploited,” said Fourrier.
Mitigating these risks requires robust security protocols including prompt sanitization, data governance policies, access controls, output filtering, data source vetting, and continuous monitoring, coupled with responsible AI practices such as data curation, model stress-testing, and customer safetytools.
Modern chief information security officers (CISOs) are navigating tough circumstances due to complex challenges and heightened regulatory pressures. The post It’s a Hard Time to Be a CISO. Transformational Leadership is More Important Than Ever. appeared first on Security Boulevard.
agencies and a spate of state government organizations and educational institutions. The post MOVEit Attack Strikes US and State Governments appeared first on Security Boulevard. A global attack campaign fueled by a vulnerability in MOVEit Transfer, a popular file transfer application, has now struck the U.S.
REvil and BlackMatter are not “shutting down” due to external pressure from the government and law enforcement agencies. The ascendency of CISOs. In 2022 we expect to see organizations increasingly moving identity management systems into the CISO organization. Reconstituted hacker rings. Don’t believe the hype.
For more information please visit [link] About Joseph Steinberg Joseph Steinberg serves as a cybersecurity-focused expert witness, board member, and advisor to businesses and governments around the world. He previously served on — and was unanimously elected chairman of — a governmental financial advisory board.
For the first time, over a dozen cybersecurity companies have come together to produce an agnostic study titled LATAM CISO Report 2023: Insights from Industry Leaders. The 2023 LATAM CISO Report offers different cybersecurity perspectives of industry leaders in Latin America. Duke University conducted the survey.
CISOs report a growing focus on managing AI-generated vulnerabilities and addressing insider threats amplified by the misuse of advanced AI tools. CISOs are working on improving collaboration with federal partners to share intelligence and best practices for AI threat management. Promote the CISO's role in digital transformation.
As the year 2025 rushes forward, the responsibilities of CISOs are continuing to evolve. The year will continue to shape the CISO role into an exciting combination of leadership and tech expertise. Below are three specific trends to keep in mind as we manage the complexities, challenges, and opportunities of the CISO role.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content