This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The oath Marene Allison took years ago to defend and protect the United States is the same tenet that now guides her work maintaining cybersecurity at one of the largest pharmaceutical and consumer packaged goods manufacturers in the world. It’s important to understand I’m here to protect this company that is focused on human healthcare.
The manufacturing sector faces an increasingly daunting cyber threat landscape that puts production operations, intellectual property, and entire supply chains at risk. Manufacturers must make cyber resilience a fully institutionalized part of their organizational identity." trillion annually. "
However, industries reliant on shared devices—such as healthcare, retail, and manufacturing—face unique challenges. Similarly, in retail and manufacturing, delays caused by authentication procedures reduce overall efficiency. These fast-paced environments need a more flexible approach to balance security, speed, and user privacy.
For all the discussion around the sophisticated technology, strategies, and tactics hackers use to infiltrate networks, sometimes the simplest attack method can do the most damage. in different industries, including energy, manufacturing, and healthcare.
Manufacturing: IP theft and ransomware are top risks; OT/ICS systems still lag in basic controls. The 2025 DBIR is a call to arms for CISOs and security leaders to rethink how they detect, respond to, and recover from breaches. James Scobey , CISO at Keeper Security: "Humans are always the weakest link in 'abuse of trust' attacks.
Departments such as support, manufacturing, design, services, and delivery are enhanced by smart security measures, which allay distracting setbacks and increase the overall inertia. Business initiatives demand faster, more efficient outcomes and technology responds. Smarter security is the rising tide that lifts all ships.
We’ve been trying to do that for years and as new technologies come into play, that modernization and optimization is critically important. I’m curious how you evaluate the cybersecurity industry and IT security teams when it comes to matching their technology and process to that increased pace? I lived it.
About our CISO Advisor team. I lead Cisco’s global CISO Advisors team, a group of security leaders dedicated to lending our experience to all different kinds of organizations across the world. For us, it’s about supporting other CISOs and security leaders to be the very best version of themselves at their jobs. How we can help.
In 2022, we will see 5G go from new technology to a business enabler bringing previously unimaginable use cases because of its high bandwidth and lower latency. Data from the current AT&T Cybersecurity Insights Report shows that 5G technology is being driven by the line of business and has been siloed between IT and OT organizations.
By Tyler Farrar, CISO, Exabeam. Early in the pandemic, some shifted focus to help manufacture the emergency equipment needed to address a public health crisis. In almost every case, technology has played a vital role in facilitating and supporting these changes. Unfortunately, so were cyber adversaries. Leaving The Legacy.
This is a decision that CISOs and executives must make with their bottom line in mind, and it's never an easy choice. BlackBerry QNX is an "all-purpose technology built for the world's most critical embedded systems." Note: in some cases, manufacturers may need to develop and test their own software patches.".
Stephanie Benoit Kurtz thought she had a good deal when, in one of her former CISO roles, she signed a three-year contract with a vendor for vulnerability management as a service. It’s hard to go back to the manufacturer and say, ‘I didn’t need that module so can I get my money back?” To read this article in full, please click here
And what if consumers learned that this disruption could have been prevented if meat producers had secured their supply chains with modern technology? These questions are all worth posing in light of the recent cyberattack on the world’s largest meat manufacturer, JBS , which led to the closure of five meat processing plants across the U.S.
Within these government labs and agencies, taking place is a groundswell of innovation in deep technology cyber disciplines to the tune of billions of dollars annually over the past three decades. In Silicon Valley, the initial technology seeds were planted in World War II, when the U.S.
Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. Prior to joining Delta Dental, Almeida was the CISO at Covanta Holding Corporation, a leader in energy-from-waste management services.
In a company statement, WestRock said the ransomware incident has impacted both its information technology (IT) and operational technology (OT) systems. The WestRock incident is a prime example of how a cyberattack on manufacturing and other OT systems can be leveraged by cybercriminals to do damage to an organization.
As a result, the need to secure technology has also changed, which has given rise to the role of chief product security officer (CPSO). As a result, many organizations are finding they need someone beyond the CISO to lead this effort at the organizational level. Samford says a CPSO needs to work in close partnership with the CISO.
Major research efforts on how to detect these IEDs and detonate them harmlessly, or to infiltrate and disrupt bomb manufacturing, were referred by the idiom “Left of Boom.” Achieving “Left of Boom” cybersecurity is a journey on which every CISO should be embarked. Some “Left of Boom” Processes. Frameworks.
As oil and gas service providers like Halliburton rely heavily on sophisticated IT and OT (Operational Technology) systems to manage complex operations, any compromise to these systems could disrupt services and even impact global oil supply chains. In addition to results from those exercises, we would identify areas of improvement or gaps.
And so we think about different types of cybersecurity risk and how those risks or vulnerabilities or threat actors can actually impede that ability or an organization to meet those objectives," said Mary Faulkner, CISO at Thrivent, one of four panelists that took the stage to kick off the conference.
–(BUSINESS WIRE)– #CISO–NTT Research, Inc., a division of NTT (TYO:9432), today announced that it has named Matthew Ireland Chief Information Security Officer (CISO). SUNNYVALE, Calif.–(BUSINESS Most recently a consulting Practice Manager and Executive Security Strategist at NTT Ltd.,
Forrester also predicts that the number of women CISOs at Fortune 500 companies will rise to 20 percent in 2019 , compared with 13 percent in 2017. Her work centered on helping aerospace manufacturers manage the convergence of cyber risk across their increasingly complex business ecosystem, including IT, OT and connected products.
Part two is comprised of essays by CISOs from leading enterprises outlining what needs to get done. China has aggressively assembled a vast and growing technology base to expand its influence, and, when needed, spy on the rest of the world. The US needs to be more aware of China’s broader, surreptitious digital strategy.
And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.
Currently, over 14,000 customers are using it to share technology insights, feedback, and best practices, and also to make meaningful connections with others in the industry. Kevin’s desire to improve his knowledge doesn’t stop with technology and cybersecurity. Being the Head of Information Technology is never an easy job.
However, the technology already exists to protect against these threats. Enea: In a recent survey on CISO concerns and plans for Cloud/SaaS security , carried out by Cybersecurity Insiders, 94% of respondents said that their organization was concerned about cloud security with 22% extremely concerned.
A former CISO, he has held security and operational risk roles in financial services, technology, manufacturing, health service, and local government organisations. David has been providing advisory and consulting services to in-house and external clients across the full industry spectrum for over thirty years.
The potential loss of reputation from a privacy breach is a clarion call for business executives and CISOs. In addition, the risks of monetary and operational damage render it mission critical for enterprises to envision and enact the appropriate People, Process, and Technology safeguards to assure data protection and privacy.
For a security technology that’s only a few years old, microsegmentation is catching on quickly. Legacy technology protection came last, cited by just 43 percent of respondents. Katz disagrees with those priorities, which he ascribes to too many respondents simply parroting popular security vendors’ marketing strategies.
The overall implication will be that cybersecurity is valued at a higher level and has a better voice within the overall organization,” said one CISO. Despite the elevated profile cybersecurity has attained, the pandemic did not manage to bridge the traditional gap between business and technology leaders. “It
However, industries reliant on shared devices—such as healthcare, retail, and manufacturing—face unique challenges. Similarly, in retail and manufacturing, delays caused by authentication procedures reduce overall efficiency. These fast-paced environments need a more flexible approach to balance security, speed, and user privacy.
Many modern businesses in almost every sector of the economy are adopting the latest technologies for greater connectivity and efficiency. However, while many of these technologies offer myriad benefits, they can also create new cybersecurity vulnerabilities.
Todd Fitzgerald, a security expert with 20 years of experience as a chief information security officer and author of the book CISO Compass , was equally direct about the need for automation capabilities in threat intelligence. It used to be the question that would always come up with CISOs: ‘who would want my information.’
Even the most proactive enterprise CISO doesn’t have clear guidance on how to effectively move forward. What should enterprise CISOs do? But like cloud services and nearly all other types of technology, SaaS has a shared responsibility model between the vendor and the client. The same holds true for SaaS platforms.
Relying on the kindness of strangers is not an ideal strategy for CISOs and CIOs. Their needs have not changed and are unlikely to change, except those rare instances where an enterprise will choose to manufacture their own supplies rather than rely on partners. Consider, for example, Costco creating its own gigantic chicken farm.
Section 3305 mandates that medical device manufacturers must submit comprehensive plans to the FDA, focusing on monitoring, identifying, and proactively addressing medical device vulnerabilities. Moreover, manufacturers must establish and maintain processes to ensure that the device and associated systems are sufficiently cyber-secure.
granting them access to live and archived video feeds across multiple organizations, including manufacturing facilities, hospitals, schools, police departments and prisons. Indeed, “It’s easy to imagine how this footage could be used to, at a minimum, infer something about someone’s personal health,” said ExtraHop CISO Jeff Costlow.
Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. One benefit of 5G technology that enterprises are sure to take advantage of is creating private wireless networks in a process dubbed “network slicing.” Supply Chains.
Vinay Anand CPO What we saw with AI and LLMs, and given the amount of investment that has gone into progressing this technology, I expect to see rapid innovation in all aspects of LLM usage in 2024—specifically at the foundational level, such as scale and efficiency.
Do you see information risk as a business and human issue, rather than purely a technology issue? If so, you may be CISO material!] Firstly, thanks to a Zoom session with participants and presenters from Queensland, I've been reading-up on "industry 4.0".
However, while security remains a crucial responsibility for IT and CISOs, it’s important to recognize how effective identity management can extend beyond protection, playing a pivotal role in enabling business agility. Embedding agility into the organizational culture and supporting it with appropriate technology and operations is crucial.
A recent report discovered that the manufacturing sector experienced a 107% increase in ransomware attacks last year, while healthcare systems continue to be one of the most threatened sectors. Ransomware, malware, Zero-Day attacks, and more are becoming a serious threat to nearly every industry. Not even government agencies are safe.
NEW YORK–( BUSINESS WIRE )– Nemertes , a global research-based advisory and consulting firm that analyzes the business value of emerging technologies, announces the release of a Real Economic Value study on Appgate SDP , an industry-leading Zero Trust Network Access (ZTNA) solution. A complimentary copy is available here.
Credit union technology firm Trellance own Ongoing Operations LLC, and provide a platform called Fedcomp — used by double digit number of other credit unions across the United States. Companies need to examine if they can securely manage the technology they have deployed, and if it is a good fit for them. I’m concerned.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content