Remove CISO Remove Risk Remove Workshop
article thumbnail

CISO workshop slides

Notice Bored

Generally, though, the risk management and security arrangements quietly support and enable the business from the inside, as it were, rather than being exposed externally - unless they fail anyway! A glossy, nicely-constructed and detailed PowerPoint slide deck by Microsoft Security caught my beady this morning.

CISO 63
article thumbnail

Nurturing Our Cyber Talent

IT Security Guru

The IT Security Guru caught up with Tarnveer Singh a CISO and finalist in the Security Serious Unsung Heroes Awards 2023 for his thoughts on how to get more professionals involved in the cybersecurity industry: There are many ways we can inspire new cybersecurity professionals to join our industry. We must reduce barriers to entry.

CISO 129
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NIST Shores Up CSF 2.0 With Supply Chain, Governance Reforms

Security Boulevard

In advance of the public comment period, the standards organization wrapped up the last stakeholder workshops last week. of Commerce National Institute of Standards and Technology (NIST) will open a comment period for stakeholders on proposed significant reform to its Cybersecurity Framework (CSF). It is the first time in five years that.

article thumbnail

AT&T Business Summit is virtual Oct. 27-28 and free!

CyberSecurity Insiders

Challenges born from neither securing nor understanding your supply chain represent enormous risks to your business, your brand, and your customers. Description: PERSPECTIVE: Digital transformation is creating cybersecurity risks as businesses embrace new technologies and expand ecosystems of partners and suppliers.

article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

To achieve more resilience in this heightened risk environment, stepping up zero trust maturity is essential. In other words, it’s not just about implementing MFA to verify user trust, it’s about using phishing-resistant MFA with risk-based authentication , device posture checks and other security controls.

article thumbnail

The White House Memo on Adopting a Zero Trust Architecture: Top Four Tips

Cisco Security

My good friend and fellow Advisory CISO Helen Patton has done a great summary of the memo in a previous blog. Keep in mind that not all agencies are starting at the same point in terms of security posture or risk exposure. is device access dependent on device posture at first access as well as changing risk?).

article thumbnail

The discomfort zone

Notice Bored

I feel more confident about the underlying generic principles of risk, compliance, conformity, obligations, accountabilities, assurance and controls though, and have the breadth of work and life experience to appreciate the next point. The mind map is a brief glimpse of the landscape, as I see it. We're definitely in the discomfort zone here.

Risk 72