This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
I was reminded of this by Phil Cracknell who posted on linkedin that in his opinion the Kevin Costner, Whitney Houston classic, Bodyguard was the best infosec movie. The movie starts on the outskirts of a jungle and the CISO (Arnie) with his team land in their helicopters. This shows how quickly a CISO can get burnt out on the job.
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America. Many CISOs are already burnt out, and there is shortage of qualified CISOs globally.
If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. Becoming a CISO is not something you’re going to be able to do right away. It is not possible to get a CISO status unless you have extensive field experience.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchison appeared first on The Security Ledger with Paul F. Dustin Hutchison is CISO at Pondurance. Click the icon below to listen.
Pondurance CISO Dustin Hutchison joins me to talk about how companies can operationalize MDR within their environment. The post Spotlight: Operationalizing MDR with Pondurance CISO Dustin Hutchinson appeared first on The Security Ledger with Paul F. Dustin Hutchinson is CISO at Pondurance. Click the icon below to listen.
CybeReady’s Hi-5 brings together InfoSec leaders for peer-to-peer sharing via five short questions and insights. The post Hi-5 With A CISO <br><br> Dmitriy Sokolovskiy, Avid Technology appeared first on CybeReady. He held information security positions in CyberArk for 11 years, and 3 […].
Many of Gillis’s comments echoed those that I have heard in recent months from CISOs and others within the cybersecurity industry who witness developments from various vantage points quite different from those of a vendor of cybersecurity technologies.
Chief executive officers and chief technology officers know this is a potentially existential threat both for their companies and for them professionally. The post Reducing InfoSec Threats Takes a Village appeared first on Security Boulevard. In 2021 alone we’ve seen data breaches impact many Fortune 500 companies.
Ira Winkler, CISO at Skyline Technology Solutions, recounts his amazing journey from wannabe astronaut to NSA intelligence analyst, social engineer, systems hacker and author, and some of the crazy things that happened along the way - check it out. The post CISO Stories Podcast: So You Want to be a Cyber Spy?
As defenders of digital assets, Chief Information Security Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. It also cites the emergence of recent technologies, and the proliferation of criminal groups, as issues increasing pressure on staff.
They discuss the challenges within the cybersecurity industry, including the transition to cloud computing and the neglect […] The post Alyssa Miller: Charting the Course Through InfoSec and Aviation appeared first on Shared Security Podcast.
Rafal Los, host of the popular Down the Security Rabbithole Podcast, joins us to discuss CISO liability risk and the ongoing discussion in the cybersecurity community about CISOs going to jail.
Many technology workers will resign from their comfortable, high-paying jobs at larger employers. CISO shortage. CISO exodus. Chief Information Security Officers (CISOs) have a rare combination of business acumen, operational knowledge, technical insights, and legal/compliance experience.
The information security industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts. The post Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s Challenges appeared first on The.
In this episode, we discuss the SEC’s charges against SolarWinds’ CISO for misleading investors about a major cyberattack. The post SEC vs. SolarWinds CISO, Classiscam Scam-as-a-Service appeared first on Security Boulevard.
The title ' CISO Workshop: Security Program and Strategy ' with ' Your Name Here ' suggests it might be a template for use in a workshop/course bringing CISOs up to speed on the governance, strategic and architectural aspects of information security, but in fact given the amount of technical detail, it appears to be aimed at informing IT/technology (..)
Here are some of the most amusing ones InfoSec memes we've seen. We've come across a lot of cybersecurity memes here at SecureWorld, and a few always seem to pop up during presentations at our regional cybersecurity conferences. Top 10 cybersecurity memes.
We constantly see new threats, and threat vectors, come and go; which puts a tremendous strain on the InfoSec teams that have to protect organizations and businesses from these threats. With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize.
He has been a first-hired CISO at five different companies. He is the father of five children and gives talks on helping families work through social media and technology challenges. A : When I was with Bright Horizons, many top-tier clients demanded InfoSec competence. I learned from them. I learned from them.
Tatu Ylönen, SSH founder and inventor of Secure Shell, discusses the genesis for the protocol and his keen interest in the application of technological solutions to fundamental cybersecurity challenges - check it out. The post CISO Stories Podcast: Necessity is the Mother of Security appeared first on Security Boulevard.
This nonstop barrage of security crises has made certain infosec leaders and practitioners more aware than ever of the job’s impact on mental healthy, and the importance to protect against stress, exhaustion and burnout. Corll said he closely interacts with about 20 other CISOs through the U.S.-based But how have they been managing?
The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. In addition, the risks of monetary and operational damage render it mission critical for enterprises to envision and enact the appropriate People, Process, and Technology safeguards to assure data protection and privacy.
Never in history has the cyber defender had access to so many technologies and tools to defend our companies. The post CISO Stories Podcast: Is There a Magic Security Control List? This has created a “Fog of More,” making the choices difficult to manage. appeared first on Security Boulevard.
The virtual conference is free to attend and will span three days including multiple tracks: Frameworks, Security, & Risk, Transforming the C-Suite, and InfoSec 360. For CISOs, learn how you can transform your role to support your organization and fellow C-suite members in the digital age. InfoSec 360. About CyberSaint.
It was fitting that the opening keynote panel for SecureWorld Chicago on June 8th was titled " Making the Cybersecurity Music: Navigating Challenges and Opportunities in Today's InfoSec Landscape. Buerger recently joined Kraft Heinz as its Business Information Security Officer after serving as CISO at a smaller company.
Government actions will increase: Expect more government regulations, state-sponsored cyberattacks, and increased documentation required to protect CISOs. AI Use Danger As with any emerging technology, many organizations should expect errors and growing pains as teams learn the nuances of applying the technology.
In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance. As the rules were authorized in late 2023, we shared what we see as the implications for infosec leaders. Check Point Software Technologies Ltd. Avaya Holdings Corp., and where are we at risk?
We covered the new rules on July 31, with some thoughts from InfoSec leaders. Sam Masiello , CISO at The Anschutz Corporation, had this to say back in July: "I would expect that many CISOs today are feeling as if their job just got harder and now has a brighter spotlight shining specifically on them.
But infosec thought leaders say that blaming an intern ignores the true roots of the problem, including insufficient credentials policies and access management practices – as evidenced in part by the simplicity of the password itself: “solarwinds123”. .” Infosec experts similarly chided the company for a lack of strong credentials.
A : I have worked in information technology (IT) and networking for more than 20 years in the retail, distribution, and legal industries. My goals in InfoSec are similar: to teach the organization how to protect itself. A : Word of mouth and an opportunity to be involved from the ground up in establishing an InfoSec team at a law firm.
With a career spanning two decades as a technology provider to businesses and government agencies, Levine brings a strategic and pragmatic approach to building secure software and cloud services without disrupting product velocity. Todd Bell serves as the chief information security officer and executive director at Valleywise Health.
Consider, if you will, that fundamentally we in infosec want people to make better decisions. No matter how you look at it, DevOps is the way that business should operate, and that is - interestingly enough - exactly matched to the org management model that Laloux describes (without ever getting into technology or DevOps!).
Infosec is one of the most demographically lopsided industries around in terms of gender. A man, for example, is 5x more likely to hold the title of CISO than a woman. If past is prologue, as the saying goes, there is reason for concern. Our Guests. Lea Kissner, Twitter: Engineering Respect.
In 2022, we will see 5G go from new technology to a business enabler bringing previously unimaginable use cases because of its high bandwidth and lower latency. Data from the current AT&T Cybersecurity Insights Report shows that 5G technology is being driven by the line of business and has been siloed between IT and OT organizations.
A common perception in the infosec community is that there can never be too much security, but it is understood that “too much” security is expensive — and sometimes, prohibitively so — from a business perspective. Quality is commonly understood to come at a price.
Paul Rapier, Vice President of Information Technology for the Detroit Pistons, led a discussion on best practices for InfoSec teams. The panel was lead by Nick Schappacher, SVP & Deputy CISO at KeyBank, and Mary Rowley, Sr. Manager of Third-Party Risk at Raytheon Technologies.
Working as CISO, DeSouza's areas of expertise include strategic planning, risk management, identity management, cloud computing, and privacy. The recent Verkada incident serves as a stark reminder, emphasizing the pressing need for CISOs to prioritize integrated IoT security and privacy in their strategic considerations.
.–( BUSINESS WIRE )– Noname Security , the API security company, today announced the formation of a Strategic Advisory Board to support the company’s global expansions and establish Noname as a trusted API security provider to CISOs around the world. Alissa Knight , CISO, recovering hacker, InfoSec influencer.
If or when more attacks are uncovered, end-user organizations will need to apply the lessons learned from SolarWinds and prepare to take swift and decisive action, infosec experts agreed in a series of interviews with SC Media.
Top 10 Challenges Facing CISOs in 2023 – "While 2022 was certainly no walk in the park, strong cybersecurity investments and institutional support suggest a light at the end of the tunnel. As we turn toward 2023, these will be the top ten challenges facing CISOs in the new year.". Here is a look at the year ahead.".
Ask three infosec pros and you’ll get three different answers. Presented by Duo Head of Advisory CISOs Wendy Nather, and Partner and Co-Founder at the Cyentia Institute, Wade Baker, this keynote explores the survey answers of 4,800 infosec professionals evaluating security program performance.
Blockchain Developer: Blockchain is a disruptive technology that has created new development roles in the last five years or so. The days of 'full-stack engineer' may be behind us as focus shifts towards specialized roles in technology and cybersecurity.
It starts with a strong foundation: a unified mission that breaks down the traditional silos between “security” (personnel-focused) and “InfoSec” (network-focused IT). ITMPs must include people, process, and technology—all working in close harmony. Technology: Working smarter and increasing efficiency. Focus on user activity.
As organisations work to improve their ability to manage information risk, the importance of having a Chief Information Security Officer (CISO) is also being recognised. We must encourage organisations to take innovative approaches to make industries more inclusive, even with the implementation of technology.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content