This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
“Awareness programs are great for a number of reasons, but they do not take priority over the daily fire drills that most security teams face,” said Brian Johnson, chief security officer at Armorblox. Just under 40 percent of respondents said they spent only 10% of their time on securityawareness.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Mário João Fernandes, born and raised in Mozambique, has been working in the banking sector for 29 years and has been fulfilling dedicated security roles in the cybersecurity space for over 11 years.
Information security (InfoSec) risk management with third parties, including outsourcing, requires persistence and consistency due to the primary business risk it presents. Third-party managers need to have insights into a variety of areas of information security, including.
I have attended numerous security conferences over the past several years, and at each one, I repeatedly hear about the importance of information security being incorporated within the planning and requirement analysis phase of the software development life cycle (SDLC). I agree – this is very important.
Building a securityawareness training program to develop a strong infosec culture requires time and money, and chief information security officers frequently try to make a case for such an investment by citing return on investment and other metrics of success. .” Christiaan Colen / CC BY-SA 2.0 ).
The post Reducing InfoSec Threats Takes a Village appeared first on Security Boulevard. Chief executive officers and chief technology officers know this is a potentially existential threat both for their companies and for them professionally. As a result, executives are looking to.
The post CISO Stories Podcast: No Insider Cybersecurity Risk? appeared first on Security Boulevard. For the most part, people are doing their jobs with integrity every day. What happens when an employee decides to leave the organization and start their own business – but with your Intellectual property or customer lists? .
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Piotr Stecz has been working in Adamed Pharma for 18 years in various IT and Security roles. What is the biggest challenge security […].
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. Dmitriy Sokolovskiy has been working in the cybersecurity space for over 14 years in dedicated security roles, in addition to 9 more years working in various IT areas.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. She held Audit and Security leadership roles in leading European companies. In 2014 she founded WITSEC, a professional group of women working in IT and Information Security […].
All organizations must have securityawareness training programs to teach basics to end users. The post CISO Stories Podcast: Fiscally Responsible Ways to Train and Build Community appeared first on Security Boulevard. Similarly, the technical teams need to be exposed to flexible training that is interesting to them.
We asked a few practitioners for their take on rising inflation and how it is making their jobs keeping their organizations secure more difficult—and what they are doing to try to combat these issues. "I Andrew Smeaton, CISO at Afiniti, says reassessment of cybersecurity programs and plans is necessary.
That was the case for a broadcast SecureWorld recently hosted with Mike Britton, CISO of Abnormal Security , and legendary investigative journalist Brian Krebs. Key takeaway #3: Social engineering is the most powerful attack vector against InfoSec protocols. And you know, that can cause a potential loss for that organization.".
House Oversight and Homeland Security committees last week, SolarWinds’s former and current CEOs blamed an intern for creating a weak FTP server password and leaking it on GitHub – an act which may or may not have contributed to a supply chain hack that impacted users of the tech firm’s Orion IT performance monitoring platform.
We use this type of model for our 'Whole of State' approach to security in North Dakota," says Michael Gregg, CISO for the State of North Dakota. Small entities struggle with the cost of security services. Botts is Director of the Global Cyber Security Program at University of St.
Almeida led the development and implementation of enterprise-wide information security strategy, policies, risk assessments and controls. Prior to joining Delta Dental, Almeida was the CISO at Covanta Holding Corporation, a leader in energy-from-waste management services. Louis, and chief operating officer and CTO with Upic Solutions.
This is bewildering, scary stuff, especially for relatively inexperienced infosec or cybersecurity professionals who seldom set foot outside of the IT domain. At the CISO, Information Security Manager or Privacy Officer level, the view is no less scary despite narrower knowledge gaps. Documented! Maintained!
As such, when you think about everything, be it basic security hygiene, information risk management, or even behavioral infosec, you must first consider how it fits with org culture. However, what this means within the context of optimal security can vary substantially, not the least being due to staffing challenges.
With digital business initiatives accelerating across nearly every industry, Gartner projects worldwide IT spending to reach a whopping $4.1 trillion by the end of the year. This data reflects something every forward-looking business leader already knows–digital transformation (DX) is the key to remaining competitive in 2021 and beyond.
It was a master class in social engineering, one that put an organization’s security posture at risk. Social engineering attacks like phishing take advantage of an employee’s awareness of. The post Reaction to Social Engineering Indicative of Cybersecurity Culture appeared first on Security Boulevard.
Welcome to the Ask Chloé column on Security Boulevard! Each week, Chloé provides advice to readers’ questions to help guide them as they navigate the technology industry. This week, Chloé answers questions about the use of the term ‘cyber’ and how to best start implementing diversity, equity and inclusion best practices.
Welcome to the Ask Chloé column on Security Boulevard! The post Ask Chloé: Reducing Biased Language in Job Descriptions appeared first on Security Boulevard. Each week, Chloé provides answers to readers’ questions to help guide them as they navigate the technology industry. Dear Chloé, I’ve been told.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content