This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Manufacturing: IP theft and ransomware are top risks; OT/ICS systems still lag in basic controls. The 2025 DBIR is a call to arms for CISOs and security leaders to rethink how they detect, respond to, and recover from breaches. Generative AI will play a dual role in the identity threat landscape this year.
Knowing When to Move ThreatDetection, Investigation and Response (TDIR) to the Cloud. By Tyler Farrar, CISO, Exabeam. Early in the pandemic, some shifted focus to help manufacture the emergency equipment needed to address a public health crisis. Buy a new set of tools that is laser focused on threatdetection.
While in past years, InfoSec was previously the focus and CISOs were the norm – we’re moving to a new cybersecurity world order that expands the role of the CISO to a CSO (Chief Security Officer). Manufacturing is a prime area for disruption with the increase in the number of IoT devices during the pandemic.
critical infrastructure services involving cyberattacks, counterintelligence, and crime," said VJ Viswanathan , Founding Partner, CYFORIX (former CISO and senior executive at Keurig Dr Pepper, Comcast, HD Supply, and GE). Anomaly-based detection is best suited to combat these types of threats," Fowler continued.
As the global CISO of Mediapro, Roberto has deployed Cisco SecureX together with Umbrella, Secure Endpoint, Secure Firewall, ISE, NGIP, Threat Response, AnyConnect, and Web security. With this partnership, Mediapro has reduced its threatdetection time by 90%. Let’s meet our League of Cybersecurity Heroes: Roberto Alunda.
Below is our esteemed panel of SC Awards judges, contributing from health care, engineering, finance, education, manufacturing, nonprofit and consulting, among others. Prior to joining Delta Dental, Almeida was the CISO at Covanta Holding Corporation, a leader in energy-from-waste management services.
Service providers and 5G-enabled device manufacturers both have critical roles to play in the success and sustainability of this wireless network rollout. Beyond that, network administrators must be aware of 5G-enabled vulnerabilities and prepare for threat actors seeking to take advantage of a changing ecosystem. .”
Global enterprises, including leading Fortune 500 companies in financial services, media, retail and manufacturing choose Hunters as their main SOC platform, replacing their SIEM. Hunters’ SOC Platform empowers security teams to automatically identify and respond to incidents that matter across the entire attack surface.
For a CISO, sticking to policy terms is crucial to maintain coverage and avoid financial burdens. Cybercriminals focus on targeting the manufacturing and HSA sectors as these sectors are much more susceptible to operational disruptions, making ransom demands more effective.
The Global State of Information Security Survey 2017 suggests that companies should look into deploying threatdetection tools and processes (including monitoring and analyzing security intelligence information), conducting vulnerability and threat assessments, penetration tests and security information, and event management (SIEM) tools.
Strategic perspectives provide a glimpse of what cyber-trends will be pervasive, and tactical is focuses on what technical and policy remedies will need to be prioritized by CISOs, CIOs, and their IT shops. That would include launch systems, manufacturing plants, on orbit satellites and ground-based communication systems.”
By prioritizing human-centric cybersecurity and bolstering crisis response capability, organizations can enhance their resilience against the evolving threat landscape and minimize potential damage. Useful resources include: The Professional Association of CISOs at [link].
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content