This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The full list of the Top InfoSec Innovators for 2024: [link] About One Identity: One Identity delivers unified identity security solutions that help customers strengthen their overall cybersecurity posture and protect the people, applications, and data essential to business. Ackerman Jr.
(ISC)2 : This organization offers free self-paced training for a limited time but is more recognized for its high-end Certified Information Systems Security Professional (CISSP) designation, acknowledging your ability to design and monitor a secure system environment, qualifying holders for engineering and executive infosec positions.
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. Many CISOs are already burnt out, and there is shortage of qualified CISOs globally.
In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance. As the rules were authorized in late 2023, we shared what we see as the implications for infosec leaders. This pushed C-level executives and boards to adopt measures for compliance and transparency.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. The post Hi-5 With A CISO <br><br> Mário Fernandes, Banco BPI appeared first on CybeReady. The post Hi-5 With A CISO Mário Fernandes, Banco BPI appeared first on Security Boulevard.
If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. Remesh Ramachandran, a security researcher and consultant for the government, spells it out in a Medium post. CGEIT: Certified in the Governance of Enterprise IT.
Information security (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency due to the primary business risk it presents. The post Assessing Third-Party InfoSec Risk Management appeared first on Security Boulevard.
But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. Amid a backdrop of increasingly sophisticated and frequent cyberattacks, APTs are a growing concern for CISOs and cyber risk owners.
The post InfoSec Reviews in Project Management Workflows appeared first on Security Boulevard. I agree – this is very important. But there’s one topic that does not get.
. “If it is not technically possible to remediate the vulnerability, or if remediation is cost prohibitive, the [employee] and their management must contact Information Security to obtain a waiver or risk acceptance approval from the CISO,” the SEC explained. “That’s a high-risk vulnerability.
The post CISO Stories Podcast: No Insider Cybersecurity Risk? For the most part, people are doing their jobs with integrity every day. What happens when an employee decides to leave the organization and start their own business – but with your Intellectual property or customer lists? . Guess Again! appeared first on Security Boulevard.
Rafal Los, host of the popular Down the Security Rabbithole Podcast, joins us to discuss CISO liability risk and the ongoing discussion in the cybersecurity community about CISOs going to jail.
The post 2023 Will Be The Year of Risk: 8 InfoSec Predictions for the New Year appeared first on Hyperproof. The post 2023 Will Be The Year of Risk: 8 InfoSec Predictions for the New Year appeared first on Security Boulevard.
I have a CISO peer who calls himself a 'compulsive interviewer' where he finds himself talking to wait staff, bartenders, retail workers, hospitality workers, those who show unique problem solving skillsworking under pressure or applying pattern matching to anticipate a problem and fixing it before it appears.
Permalink The post BSides Sofia 2023 – Peter Kirkov, e-Government – Keynote appeared first on Security Boulevard. Our thanks to BSides Sofia for publishing their presenter’s tremendous BSides Sofia 2023 content on the organizations’ YouTube channel.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. The post Hi-5 With A CISO <br><br> Piotr Stecz, Adamed Pharma appeared first on CybeReady. The post Hi-5 With A CISO <br><br> Piotr Stecz, Adamed Pharma appeared first on CybeReady.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. The post Hi-5 With A CISO <br><br> Dmitriy Sokolovskiy, Avid Technology appeared first on CybeReady. The post Hi-5 With A CISO Dmitriy Sokolovskiy, Avid Technology appeared first on Security Boulevard.
Permalink The post BSides Sofia 2023 – Vasil Velichkov – Hacking Attacks Against Government Institutions appeared first on Security Boulevard. Our thanks to BSides Sofia for publishing their presenter’s tremendous BSides Sofia 2023 content on the organizations’ YouTube channel.
We covered the new rules on July 31, with some thoughts from InfoSec leaders. Public companies will also have to share details about their "cybersecurity risk management, strategy, and governance" on an annual basis. What should companies do to prepare?
The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. D – Data characterization, governance, and remediation Characterization of data automatically (baseline and continuously) is vital for data protection and mitigation of business risk from operational and compliance perspectives.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. The post Hi-5 With A CISO <br><br> Andrea Szeiler, Transcom appeared first on CybeReady. The post Hi-5 With A CISO Andrea Szeiler, Transcom appeared first on Security Boulevard.
Designate a qualified individual (CISO or equivalent) responsible or overseeing and implementing a cybersecurity program and enforcing its cybersecurity policy. Require the CISO to provide a written report at least annually to the board or equivalent governing body. It's a core responsibility of the board and management team.".
Permalink The post BSides Sofia 2023 – Deputy Minister Atanas Maznev e-Government, Rosen Kirilov, PhD, UNWE – Conference Opening appeared first on Security Boulevard. Our thanks to BSides Sofia for publishing their presenter’s tremendous BSides Sofia 2023 content on the organizations’ YouTube channel.
Hopefully, you won’t ever have to hire a lawyer to defend yourself against a government regulator. The post CISO Stories Podcast: He Fought the FTC Over a Breach and Won appeared first on Security Boulevard.
He details the war aims of Russia, including destroying the Ukrainian government, society, population, and the country as a whole. His closing keynote provides eye-opening details about the cyber war between Ukraine and Russia now that it's eight months in. And 9 more informative sessions.
Permalink The post BSides Knoxville 2023 – Patterson Cake – 10 Things I Wish Every CISO Knew Before An Incident: A View From The IR Trenches appeared first on Security Boulevard. Our thanks to BSides Knoxville for publishing their presenter’s outstanding BSides Knoxville 2023 content on the organizations’ YouTube channel.
The virtual conference is free to attend and will span three days including multiple tracks: Frameworks, Security, & Risk, Transforming the C-Suite, and InfoSec 360. For CISOs, learn how you can transform your role to support your organization and fellow C-suite members in the digital age. InfoSec 360.
The post CISO Stories Podcast: Necessity is the Mother of Security appeared first on Security Boulevard. Tatu Ylönen, SSH founder and inventor of Secure Shell, discusses the genesis for the protocol and his keen interest in the application of technological solutions to fundamental cybersecurity challenges - check it out.
We kicked off the conference with a fireside chat from local and national representatives of the United States Secret Service , who spoke at length about cyber fraud, cryptocurrency attacks, and demystifying the Secret Service's role in conjunction with the FBI and other government agencies. and work together on all these [crypto] incidents.
The post CISO Stories Podcast: Fiscally Responsible Ways to Train and Build Community appeared first on Security Boulevard. All organizations must have security awareness training programs to teach basics to end users. Similarly, the technical teams need to be exposed to flexible training that is interesting to them.
The city has a more established IT setup, including a full-time IT director, which many of the smaller towns lack, according to this Government Technology article. We use this type of model for our 'Whole of State' approach to security in North Dakota," says Michael Gregg, CISO for the State of North Dakota. This is a great approach.
Government support for programs and regulations that aim to prevent and intervene in cyber-attacks is at an all-time high. CISOs and infosec professionals are finally getting a seat at the table at an executive and board level. Let’s keep the conversation going.
In the past, fake social profiles were relatively easy to spot, however in the case of DPRK, the cybercriminals spent time to setting up a profile, get hooked up into the infosec scene, gain followers and connections through LinkedIn, making it more difficult than before to detect a fraudulent account. Techniques & Tactics.
With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. In government, Brooks served under President George W.
In one notable example, insurers refused to pay Mondelez International’s claim after the NotPetya attack was labeled an act of the Russian government, claiming the attack fell under the policy’s “hostile or warlike action in time of peace or war” exemption. And in a few high-profile cases, insurance companies have bailed.
Permalink The post Cyber Week 2023 & The Israel National Cyber Directorate Presents – AI Governance in the Wake of ChatGPT – Policy and Governance appeared first on Security Boulevard.
CISOs have praised the certificate program, stating that they would regard it as a proper qualification for entry-level roles. These attacks pose a significant risk to hospitals, government systems, electrical grids, and many other sectors, which are now increasingly reliant on technology to function. is also a major concern.
What's important now is for executive leadership to have that same sense of urgency as infosec leaders. CEOs need to work hand-in-hand with CISOs and foster a security culture where human risk—which is by far the greatest source of risk—is actively measured, managed, and mitigated.
It starts with a strong foundation: a unified mission that breaks down the traditional silos between “security” (personnel-focused) and “InfoSec” (network-focused IT). Process: Program governance, management, and structure. Deborah Watson, Resident CISO, Proofpoint. Use this as an opportunity to understand and mitigate risks.
There are obligations relating to how it is structured, operated, governed, managed and controlled, plus all manner of internal rules voluntarily adopted by management for business reasons (some of which concern obligations under applicable laws and regs). Documented! Maintained! We're definitely in the discomfort zone here.
These quick actions earned praise from many CISOs around the world, who got what he was saying and were impressed with what he was doing. alexstamos responded to that tweet: "It is legitimately hard privacy-harm/safety-harm balancing act and the infosec community has a really limited view into the latter.". No, it's not.
Defining “storytelling” in an InfoSec context Inspiration - We the People: Democratizing Security “Storytelling” is a word that you will hear frequently within Duo’s creative team — now part of a Brand & Strategy unit for Cisco’s rebranded security organization Cisco Secure. But where to begin?
“CISOs that are unaware of the existence of Emotet on their networks will likely not notice its removal,” said Austin Merritt, cyber threat intelligence analyst at Digital Shadows. The FBI web-shell takedown was immediately well-received by the infosec community as a whole.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content