Remove CISO Remove Manufacturing Remove Technology
article thumbnail

Johnson & Johnson CISO Marene Allison: ‘You can’t sit on today’s technology’

CSO Magazine

The oath Marene Allison took years ago to defend and protect the United States is the same tenet that now guides her work maintaining cybersecurity at one of the largest pharmaceutical and consumer packaged goods manufacturers in the world. It’s important to understand I’m here to protect this company that is focused on human healthcare.

CISO 129
article thumbnail

WEF Outlines Path to Cyber Resilience for Manufacturing Sector

SecureWorld News

The manufacturing sector faces an increasingly daunting cyber threat landscape that puts production operations, intellectual property, and entire supply chains at risk. Manufacturers must make cyber resilience a fully institutionalized part of their organizational identity." trillion annually. "

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Passwordless Authentication without Secrets!

Thales Cloud Protection & Licensing

However, industries reliant on shared devices—such as healthcare, retail, and manufacturing—face unique challenges. Similarly, in retail and manufacturing, delays caused by authentication procedures reduce overall efficiency. These fast-paced environments need a more flexible approach to balance security, speed, and user privacy.

article thumbnail

GUEST ESSAY: Recalibrating critical infrastructure security in the wake of evolving threats

The Last Watchdog

For all the discussion around the sophisticated technology, strategies, and tactics hackers use to infiltrate networks, sometimes the simplest attack method can do the most damage. in different industries, including energy, manufacturing, and healthcare.

article thumbnail

Verizon's 2025 DBIR: Threats Are Faster, Smarter, and More Personal

SecureWorld News

Manufacturing: IP theft and ransomware are top risks; OT/ICS systems still lag in basic controls. The 2025 DBIR is a call to arms for CISOs and security leaders to rethink how they detect, respond to, and recover from breaches. James Scobey , CISO at Keeper Security: "Humans are always the weakest link in 'abuse of trust' attacks.

article thumbnail

GUEST ESSAY: In pursuit of smarter cybersecurity — to overcome complex risks and grow revenue

The Last Watchdog

Departments such as support, manufacturing, design, services, and delivery are enhanced by smart security measures, which allay distracting setbacks and increase the overall inertia. Business initiatives demand faster, more efficient outcomes and technology responds. Smarter security is the rising tide that lifts all ships.

Risk 214
article thumbnail

New SEI CERT chief and first ever federal CISO: old cybersecurity models have ‘been overcome’

SC Magazine

We’ve been trying to do that for years and as new technologies come into play, that modernization and optimization is critically important. I’m curious how you evaluate the cybersecurity industry and IT security teams when it comes to matching their technology and process to that increased pace? I lived it.

CISO 109