This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
5, 2024, CyberNewswire — One Identity proudly announces it has been named a winner in the Hot Company: Privileged Access Management (PAM) category in the 12th annual Cyber Defense Awards by Cyber Defense Magazine (CDM), the industrys leading informationsecurity magazine. Alisa Viejo, Calif., Ackerman Jr.
(ISC)2 : This organization offers free self-paced training for a limited time but is more recognized for its high-end Certified Information Systems Security Professional (CISSP) designation, acknowledging your ability to design and monitor a secure system environment, qualifying holders for engineering and executive infosec positions.
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. Many CISOs are already burnt out, and there is shortage of qualified CISOs globally.
Informationsecurity (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency due to the primary business risk it presents. Third-party managers need to have insights into a variety of areas of informationsecurity, including.
One of the notable sessions at the SecureWorld Philadelphia conference, April 19-20, was a podcast recording featuring three prominent Philadelphia area cybersecurity experts, in a session titled, "CISOs Riff on the Latest in Cybersecurity. Glanden serves up the specialty cocktail of the day, the "CISO."
Even if you’re just starting your cybersecurity career, you may already be thinking about the top job in the field, Chief InformationSecurity Officer. If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. “The
I have attended numerous security conferences over the past several years, and at each one, I repeatedly hear about the importance of informationsecurity being incorporated within the planning and requirement analysis phase of the software development life cycle (SDLC). I agree – this is very important.
Many of Gillis’s comments echoed those that I have heard in recent months from CISOs and others within the cybersecurity industry who witness developments from various vantage points quite different from those of a vendor of cybersecurity technologies.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison appeared first on The Security Ledger with Paul F. Dustin Hutchison is CISO at Pondurance. Click the icon below to listen.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson appeared first on The Security Ledger with Paul F. Dustin Hutchinson is CISO at Pondurance. Click the icon below to listen.
As defenders of digital assets, Chief InformationSecurity Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. Key findings from the report include: 90% of CISOs are concerned about stress, fatigue, or burnout affecting their team's well-being.
Kerissa Varma is Group Chief InformationSecurity Officer of Old Mutual Limited, one of the largest financial services organizations on the African continent. The post CISO Stories Podcast: Hacking Your Way Into Cybersecurity appeared first on Security Boulevard.
The SEC said that under First American’s remediation policies, if the person responsible for fixing the problem is unable to do so based on the timeframes listed above, that employee must have their management contact the company’s informationsecurity department to discuss their remediation plan and proposed time estimate.
Informationsecurity challenges are proving to be a huge barrier for the artificial intelligence ecosystem. Conversely, AI is causing headaches for CISOs. Here's why.
Rafal Los, host of the popular Down the Security Rabbithole Podcast, joins us to discuss CISO liability risk and the ongoing discussion in the cybersecurity community about CISOs going to jail.
The post BSides Tampa 2021 – CISO Panel ‘John Burger, Guy Albertini, Michael Phillips, Barry Kortekas, Jon Sargent’ appeared first on Security Boulevard. Our thanks to BSides Tampa for publishing their outstanding videos on the organization's YouTube channel. Enjoy the Education!
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Dmitriy Sokolovskiy has been working in the cybersecurity space for over 14 years in dedicated security roles, in addition to 9 more years working in various IT areas.
Building a security awareness training program to develop a strong infosec culture requires time and money, and chief informationsecurity officers frequently try to make a case for such an investment by citing return on investment and other metrics of success. Huisman also had some advice for CISOs trying to make a case.
They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect […] The post Alyssa Miller: Charting the Course Through InfoSec and Aviation appeared first on Shared Security Podcast.
The net result will be less employment opportunities and eventually less job-hoping in 2023 despite the talent shortfall in IT security. CISO shortage. CISO exodus. Chief InformationSecurity Officers (CISOs) have a rare combination of business acumen, operational knowledge, technical insights, and legal/compliance experience.
The informationsecurity industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts. The informationsecurity industry is simultaneously robust and beset by problems and challenges.
The post BSidesAugusta 2021 – Russell Eubanks’ ‘4 Keys You Must Have to Be A Successful CISO’ appeared first on Security Boulevard. Many thanks to BSidesAugusta for publishing their outstanding videos from the BSidesAugusta 2021 Conference on the organization’s YouTube channel.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. She held Audit and Security leadership roles in leading European companies. In 2014 she founded WITSEC, a professional group of women working in IT and InformationSecurity […].
In this episode, we discuss the SEC’s charges against SolarWinds’ CISO for misleading investors about a major cyberattack. The post SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service appeared first on Security Boulevard.
Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. The post Water utility CISO offers tips to stay secure as IT and OT converge appeared first on SC Media. Asaavedra32, CC BY-SA 3.0
Bill Bowman, CISSP, CIPM, is the Chief InformationSecurity Officer & Data Privacy Officer at financial software company Emburse. He has been a first-hired CISO at five different companies. A : When I was with Bright Horizons, many top-tier clients demanded InfoSec competence. I learned from them.
The post BSides Tampa 2021 – Sallie Wright’s ‘The Evolving Role Of The CISO And The Security Organization’ appeared first on Security Boulevard. Our thanks to BSides Tampa for publishing their outstanding videos on the organization's YouTube channel. Enjoy the Education!
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape. Well, informationsecurity, cybersecurity happens to be a critical part of the business, being able to achieve strategic objectives.
David Nolan, Vice President of InformationSecurity at Aaron’s, joins this podcast to discuss how to achieve that consensus - check it out. The post CISO Stories Podcast: Achieving Security Buy-In – Change Approach Not Culture appeared first on Security Boulevard.
The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. T – Technology Essential to secure the digital enterprise across the Infrastructure, Application and Services dimensions of a layered security architecture. This greatly increases the attack surface for enterprises.
The post DEF CON 29 Cloud Village – Wes Lambert’s ‘Onions In The Cloud Make The CISO Proud’ appeared first on Security Boulevard. Our thanks to DEFCON for publishing their tremendous DEFCON Conference Cloud Village videos on the groups' YouTube channel.
As an informationsecurity professional, I like elegant designs — all the more so because trade-off is a prerequisite for an informationsecurity manager’s success: in particular, trade-off between the level of security and its cost in the most practical, literal sense.
This nonstop barrage of security crises has made certain infosec leaders and practitioners more aware than ever of the job’s impact on mental healthy, and the importance to protect against stress, exhaustion and burnout. Corll said he closely interacts with about 20 other CISOs through the U.S.-based based group. “We
In this week’s episode of the podcast (#219) we speak with four cybersecurity professionals about what it means to be Queer in the industry: their various paths to the informationsecurity community, finding support among their peers and the work still left to do to make informationsecurity inclusive.
For example, outcomes like adapting to external events, creating a security culture, and cost-effective programs, all improve when organizations make progress towards zero trust security (based on survey responses from 4,751 active informationsecurity and privacy professionals from 26 countries).
Leighton has some real admiration for the Ukraine government and the host of supporters across the world—including 200,000 InfoSec practitioners aiding in Ukraine's cyber efforts—for not just battling Russia, but winning in many instances.
The virtual conference is free to attend and will span three days including multiple tracks: Frameworks, Security, & Risk, Transforming the C-Suite, and InfoSec 360. Informationsecurity leaders must also be prepared to evolve themselves, as leaders and educators, to assist in these and other transformation efforts.
Prior to Mastercard, Abdullah was the chief informationsecurity officer at Xerox, where she established and led a corporate-wide information risk management program. She also served as the deputy chief information officer of the White House. She is also the host of the Mastering Cyber podcast.
It will be crucial for everyone to stay informed and prepared.". Top 10 Challenges Facing CISOs in 2023 – "While 2022 was certainly no walk in the park, strong cybersecurity investments and institutional support suggest a light at the end of the tunnel.
Bryan Bechard is CISO for Flagship Credit Acceptance. He has been working in cybersecurity for the last 20 years and teaching the next generation of InfoSec pros. They had an informationsecurity division and working on anti-virus, SIEM, and other security products seemed like a cool skillset to have.
If or when more attacks are uncovered, end-user organizations will need to apply the lessons learned from SolarWinds and prepare to take swift and decisive action, infosec experts agreed in a series of interviews with SC Media. Department of Education.
The post BSides Tampa 2021 – Larry Whiteside’s ‘So You Wanna Be A CISO … Are You Sure?’ ’ appeared first on Security Boulevard. Our thanks to BSides Tampa for publishing their outstanding videos on the organization's YouTube channel. Enjoy the Education!
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content