This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
I was reminded of this by Phil Cracknell who posted on linkedin that in his opinion the Kevin Costner, Whitney Houston classic, Bodyguard was the best infosec movie. The movie starts on the outskirts of a jungle and the CISO (Arnie) with his team land in their helicopters. This shows how quickly a CISO can get burnt out on the job.
Technologies that were figments of the imagination a dozen years ago, if they were conceived of at all, quickly become mainstream — think generative artificial intelligence (GenAI) or blockchain. As they do, they create more security vulnerabilities and inherent business, changing the nature of cybersecurity careers. million workers.
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. Many CISOs are already burnt out, and there is shortage of qualified CISOs globally.
If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. Becoming a CISO is not something you’re going to be able to do right away. It is not possible to get a CISO status unless you have extensive field experience.
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. It also cites the emergence of recent technologies, and the proliferation of criminal groups, as issues increasing pressure on staff.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison appeared first on The Security Ledger with Paul F. Dustin Hutchison is CISO at Pondurance. Click the icon below to listen.
In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance. As the rules were authorized in late 2023, we shared what we see as the implications for infosec leaders. Check Point Software Technologies Ltd. Avaya Holdings Corp., and where are we at risk?
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson appeared first on The Security Ledger with Paul F. Dustin Hutchinson is CISO at Pondurance. Click the icon below to listen.
But as a CISO or cyber risk owner, it’s not just about locking down sensitive informationits about doing it without slowing down your people. Amid a backdrop of increasingly sophisticated and frequent cyberattacks, APTs are a growing concern for CISOs and cyber risk owners.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. The post Hi-5 With A CISO <br><br> Dmitriy Sokolovskiy, Avid Technology appeared first on CybeReady. He held information security positions in CyberArk for 11 years, and 3 […].
Many of Gillis’s comments echoed those that I have heard in recent months from CISOs and others within the cybersecurity industry who witness developments from various vantage points quite different from those of a vendor of cybersecurity technologies.
Chief executive officers and chief technology officers know this is a potentially existential threat both for their companies and for them professionally. The post Reducing InfoSec Threats Takes a Village appeared first on Security Boulevard. In 2021 alone we’ve seen data breaches impact many Fortune 500 companies.
Ira Winkler, CISO at Skyline Technology Solutions, recounts his amazing journey from wannabe astronaut to NSA intelligence analyst, social engineer, systems hacker and author, and some of the crazy things that happened along the way - check it out. The post CISO Stories Podcast: So You Want to be a Cyber Spy?
Rafal Los, host of the popular Down the Security Rabbithole Podcast, joins us to discuss CISO liability risk and the ongoing discussion in the cybersecurity community about CISOs going to jail.
Many technology workers will resign from their comfortable, high-paying jobs at larger employers. CISO shortage. CISO exodus. Chief Information Security Officers (CISOs) have a rare combination of business acumen, operational knowledge, technical insights, and legal/compliance experience.
They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect […] The post Alyssa Miller: Charting the Course Through InfoSec and Aviation appeared first on Shared Security Podcast.
We constantly see new threats, and threat vectors, come and go; which puts a tremendous strain on the InfoSec teams that have to protect organizations and businesses from these threats. With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize.
The information security industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts. The post Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s Challenges appeared first on The.
Here are some of the most amusing ones InfoSec memes we've seen. We've come across a lot of cybersecurity memes here at SecureWorld, and a few always seem to pop up during presentations at our regional cybersecurity conferences. Top 10 cybersecurity memes.
In this episode, we discuss the SEC’s charges against SolarWinds’ CISO for misleading investors about a major cyberattack. The post SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service appeared first on Security Boulevard.
He has been a first-hired CISO at five different companies. He is the father of five children and gives talks on helping families work through social media and technology challenges. A : When I was with Bright Horizons, many top-tier clients demanded InfoSec competence. I learned from them. I learned from them.
The title ' CISO Workshop: Security Program and Strategy ' with ' Your Name Here ' suggests it might be a template for use in a workshop/course bringing CISOs up to speed on the governance, strategic and architectural aspects of information security, but in fact given the amount of technical detail, it appears to be aimed at informing IT/technology (..)
The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. In addition, the risks of monetary and operational damage render it mission critical for enterprises to envision and enact the appropriate People, Process, and Technology safeguards to assure data protection and privacy.
Ask three infosec pros and you’ll get three different answers. Presented by Duo Head of Advisory CISOs Wendy Nather, and Partner and Co-Founder at the Cyentia Institute, Wade Baker, this keynote explores the survey answers of 4,800 infosec professionals evaluating security program performance.
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape. Buerger recently joined Kraft Heinz as its Business Information Security Officer after serving as CISO at a smaller company.
We covered the new rules on July 31, with some thoughts from InfoSec leaders. Sam Masiello , CISO at The Anschutz Corporation, had this to say back in July: "I would expect that many CISOs today are feeling as if their job just got harder and now has a brighter spotlight shining specifically on them.
Tatu Ylönen, SSH founder and inventor of Secure Shell, discusses the genesis for the protocol and his keen interest in the application of technological solutions to fundamental cybersecurity challenges - check it out. The post CISO Stories Podcast: Necessity is the Mother of Security appeared first on Security Boulevard.
A : I have worked in information technology (IT) and networking for more than 20 years in the retail, distribution, and legal industries. My goals in InfoSec are similar: to teach the organization how to protect itself. A : Word of mouth and an opportunity to be involved from the ground up in establishing an InfoSec team at a law firm.
Never in history has the cyber defender had access to so many technologies and tools to defend our companies. The post CISO Stories Podcast: Is There a Magic Security Control List? This has created a “Fog of More,” making the choices difficult to manage. appeared first on Security Boulevard.
The virtual conference is free to attend and will span three days including multiple tracks: Frameworks, Security, & Risk, Transforming the C-Suite, and InfoSec 360. For CISOs, learn how you can transform your role to support your organization and fellow C-suite members in the digital age. InfoSec 360. About CyberSaint.
I have a CISO peer who calls himself a 'compulsive interviewer' where he finds himself talking to wait staff, bartenders, retail workers, hospitality workers, those who show unique problem solving skillsworking under pressure or applying pattern matching to anticipate a problem and fixing it before it appears.
Top 10 Challenges Facing CISOs in 2023 – "While 2022 was certainly no walk in the park, strong cybersecurity investments and institutional support suggest a light at the end of the tunnel. As we turn toward 2023, these will be the top ten challenges facing CISOs in the new year.". Here is a look at the year ahead.".
But infosec thought leaders say that blaming an intern ignores the true roots of the problem, including insufficient credentials policies and access management practices – as evidenced in part by the simplicity of the password itself: “solarwinds123”. .” Infosec experts similarly chided the company for a lack of strong credentials.
Consider, if you will, that fundamentally we in infosec want people to make better decisions. No matter how you look at it, DevOps is the way that business should operate, and that is - interestingly enough - exactly matched to the org management model that Laloux describes (without ever getting into technology or DevOps!).
With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. Todd Bell serves as the chief information security officer and executive director at Valleywise Health.
I think it requires taking a step back and assessing what you can do with less," said Chris Roberts, CISO and Senior Director at Boom Supersonic. Too many folks focus on the technology as opposed to the people or process. Andrew Smeaton, CISO at Afiniti, says reassessment of cybersecurity programs and plans is necessary.
Infosec is one of the most demographically lopsided industries around in terms of gender. A man, for example, is 5x more likely to hold the title of CISO than a woman. If past is prologue, as the saying goes, there is reason for concern. Our Guests. Lea Kissner, Twitter: Engineering Respect.
A common perception in the infosec community is that there can never be too much security, but it is understood that “too much” security is expensive — and sometimes, prohibitively so — from a business perspective. Quality is commonly understood to come at a price.
We kicked off Philadelphia with a fun and riveting CISO panel discussion (appropriately titled, "Three CISOs Walk into a Bar"), and ended the day with a heroic retelling of a man's journey to evacuate his colleague's family from Ukraine during the recent Russian attacks on the country.
In 2022, we will see 5G go from new technology to a business enabler bringing previously unimaginable use cases because of its high bandwidth and lower latency. Data from the current AT&T Cybersecurity Insights Report shows that 5G technology is being driven by the line of business and has been siloed between IT and OT organizations.
Blockchain Developer: Blockchain is a disruptive technology that has created new development roles in the last five years or so. The days of 'full-stack engineer' may be behind us as focus shifts towards specialized roles in technology and cybersecurity.
Paul Rapier, Vice President of Information Technology for the Detroit Pistons, led a discussion on best practices for InfoSec teams. The panel was lead by Nick Schappacher, SVP & Deputy CISO at KeyBank, and Mary Rowley, Sr. Manager of Third-Party Risk at Raytheon Technologies.
With technology advancements and improved feature sets, including products like Cisco’s Secure Endpoint Premier with SecureX Threat Hunting puts threat hunting well within the reach of all companies, no matter the size or security maturation level they have already achieved.
Whenever I can help solve business problems and layer some security in, that’s a pretty big win.” – Jason Waits, Chief Information Security Officer (CISO), Inductive Automation Ready to start charting your zero trust program? For more information, check out our on-demand webinar Your Zero Trust Roadmap.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content