This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. Becoming a CISO is not something you’re going to be able to do right away. It is not possible to get a CISO status unless you have extensive field experience.
In this post, we look at the enforcement actions the SEC has taken and what public company CISOs should do to stay in compliance. Check Point Software Technologies Ltd. Exposure management can help meet the SEC requirements So what can a CISO do about this? For example, in October 2024, the SEC fined Unisys Corp.,
With the addition of Kenna Security into our program we now have over 250 technology partners and over 400 integrations for our mutual customers to utilize. An integration with Cigent Technology is now available for Secure Endpoint customers to integrate with. Kenna has a healthy 3rd Party ecosystem of technology partners.
Watch the (ISC)² webinar Protecting the Enterprise: 5 Components needed for Cybersecurity Training to get insights into who needs cybersecurity training and much more. Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO. Compliance Officer.
If there is one statistic that sums up the increasing pace of technological change, it might well be this. Dr. Valerie Lyons, COO of BH Consulting, talked about these critical topics for the Institute of Directors Ireland in a recent webinar. And they need to do this while navigating an increasingly complex regulatory landscape.
Herzog “The merging of cybersecurity and data infrastructure has been compelling CIOs, CISOs and IT team leaders to rethink how to secure enterprise storage across hybrid multi-cloud deployments in light of increasing cyberattacks. Webinar On Demand. To watch Infinidat’s end-user webinar about the new solutions ?
As an advisory CISO and part of Cisco’s strategy group, an essential part of my role is talking to CISOs from every kind of organization. As well as talking to CISOs, I also believe it is crucial to get perspectives from all sides. As well as talking to CISOs, I also believe it is crucial to get perspectives from all sides.
In late 2020, HelpSystems research with CISOs of global financial organizations revealed that 45% of respondents reported an increase in cyber-attacks since the pandemic first emerged. Almost half the CISOs in the HelpSystems’ research admitted that they had already increased their investment in secure collaboration tools. Featured: .
John Masserini, of Tag Cyber, will explore practical approaches to advancing zero trust along with his fellow panelists: Kevin Dana, VP of Information Technology for World Wide Technology; Marcos Christodonte II, Global CISO for CDW; and Allen Jeter, Director of IT for Chainalysis.
TL,DR: Check out our on-demand webinar Your Zero Trust Roadmap , where we outline the five key steps to secure user access to apps. For more information, check out our on-demand webinar Your Zero Trust Roadmap. So how does one go from MFA to full zero trust maturity? What does that journey look like?
Plus, get the latest on Active Directory security, CISO salary trends and ransomware attacks! Organizations must understand that employees inevitably will use generative AI, the report says, because of the productivity boost it offers; and that employees need guidance to understand the risks of using this technology.
However, modernization and transformative technologies are creating new vulnerabilities resulting in data breaches. Taking the leap into these technologies may feel like the right direction, but only 30% of those using emerging environments are taking proper steps to encrypt and protect the data. The Future is Multi-cloud.
Advisory CISO J. Wolfgang Goerlich details in our white paper, Passwordless: The Future of Authentication , how pairing passwordless technology with strong MFA to protect access across cloud and on-prem is a practical way to provide the broadest security coverage today.
on-demand webinar) The Data-Factor: Why Integrating DSPM Is Key to Your CNAPP Strategy (blog) When CNAPP Met DSPM (infographic) VIDEO Integrated DSPM features - enable data protection today! Thus, multi-cloud environments will become the norm in 2025, as organizations avoid vendor lock-in and increase their cloud options and flexibility.
Any unfamiliarity with this new technology can lead to confusion and frustration, especially for those who are not tech-savvy. CISOs and IT security professionals have two options: 1. Watch our joint webinar The Secret to Scalable FIDO Success together with experts from Microsoft and Versasec now. Benefit from FIDO 2.1
If you are not sure what the new security requirements are or if they affect your business or organization, don’t worry – we put together a webinar to help answer those questions. Watch the FTC Safeguards Rule Webinar. The definition of financial institutions includes non-financial institutions.
This webinar is suitable for organisations hoping to achieve ISO 27001 certification as well as those that have already achieved ISO 27001 certification and are thinking about becoming certified to ISO 27701. David has helped a wide range of clients from start-ups to multinationals to achieve ISO 27001 certification.
Recent HelpSystems research with CISOs in global financial service organizations found that almost one-third believe data breaches have the potential to cause the most damage over the next 12 months. Most important is the Adaptive Redaction technology within the Clearswift DLP. Request a Demo. Additional Resources. Featured: .
I began by discussing the first core feature – technology – I believe you should consider, along with the benefits and potential drawbacks. When e2e-assure, a TDR provider surveyed ITDMs and CISOs in the UK market, they found that 37% of buyers expressed frustration with this standard practice. Register here – [link]
So for many IT teams, the news that tech giants are steadily embracing passkey technology is exciting. We’ve been answering these questions in this blog series by unpacking the pros and cons of passkey technology from different authentication perspectives. Nobody likes passwords. But how effective are passkeys really?
John Checco, Resident CISO at Proofpoint, says it is usually the amount of drama involved. That was interesting that all the technology that we have didn't catch the majority of these insider threats.". Insider threat webinar now available on demand. The webinar also looks at the following: Who owns insider threat risk?
And get the latest on the top “no-nos” for software security; the EU’s new cyber law; and CISOs’ communications with boards. Organizations are eagerly trying to understand both how generative AI can help their cybersecurity programs and how this technology is being used by malicious actors to make cyberattacks harder to detect and prevent.
Recently Richard Archdeacon, advisory CISO and Josh Green, Technical Strategist at Duo Security, gave a virtual keynote presentation at the Cybersecurity Leadership Summit 2021 in Berlin where they discussed the Future of Work. In reality the technology goes much deeper than bitcoin, cryptocurrencies, ethereum, etc.
Cyberattacks are not only a technological problem for companies, but they also represent a very real financial threat. Currently, cyber insurance is experiencing a ‘hard’ market, meaning that prices are increasing and there is less capacity available,” said Erik Barnes, Senior Underwriter, Cyber & Technology at AXA XL.
This eBook shares how major companies are using distributed ledger technology (DLT) today and the importance of security planning for blockchain operations. In this episode, NetSPI’s Field CISO and host of the podcast Nabil Hannan tackles a pivotal topic: cybersecurity education.
We participated in B Sides last month, hosted a webinar on “How to Increase Test Coverage With Mayhem for API”, and hosted a university hackathon at UC Santa Cruz. Join the Mayhem team in our upcoming webinar to learn how to identify and address vulnerabilities in open-source libraries. When : May 24, 10 a.m. PT / 1 p.m.
Adopting a cloud-smart approach across an agency’s infrastructure is a complex process with corresponding challenges for federal CISOs. There are three key concepts for federal CISOs to consider as they develop multi- and hybrid-cloud implementation strategies: There is no one-size-fits-all hybrid environment.
It was apropos that Ray Yepes, newly appointed CISO for the State of Colorado, opened the 2022 SecureWorld Denver conference on October 6th. Ray Yepes, CISO for the State of Colorado, presents the opening keynote. Down the hall, Brenden Smith, CISO at FirstBank, presented "Revisiting Deception Systems: Enterprise Use Cases."
These habits highlight the need for more modern password technology and stronger authentication methods. Cisco CISO Wolfgang Goerlich highlights the case for why passwords are kept around in The Life and Death of Passwords : “In an ideal world, we say goodbye to passwords altogether. Will we ever get rid of passwords completely?
If you look at LinkedIn, many consultants present themselves as trusted advisors to CISOs or their teams. In what way is this new technology actually even more risky? Forrester via Allie Mellen webinar [link] A human domain expert should always review and validate LLM-generated suggestions before implementation.
Healthcare executives from CDOs to CISOs understand that an organization's success hinges on meeting these demands with seamless, secure consumer experiences across all touchpoints. 81% of payer executives say their company is investing in technology to improve member experience.
Given the risks to a university associated with password weakness and credential theft, it’s fair to say that higher education environments fall firmly into the “would benefit from the technology” category when thinking about whether passwordless is a fit. However, the question now becomes how to implement this new technology.
Encryption Shane Tully | Global CISO, A24 More About This Author > The Payment Card Industry Data Security Standard ( PCI-DSS ) v4.0 Ongoing Technology and Process Enhancements Choose and implement security technologies that can help meet the new encryption and authentication requirements. Also consider process enhancements.
Introducing Velocity Insights: Your Guide to Unmasking the Hidden Forces Shaping Your Security Posture Imagine being a Security Leader – an Analyst, Manager, or CISO – constantly under pressure to improve your organization’s security posture. Register for the webinar here! Don’t wait, the threat actors aren’t.
In a recent webinar, Sectigo’s Tim Callan and Nick France discussed the ramifications of 90-day certificates. For CISOs and their teams, this step toward even shorter certificate lifespans represents a significant change in how they will approach establishing digital trust. Has there been any pushback whatsoever from the CA’s?
Larger companies with established CISO departments see the use of mTLS as essential to reinforce protection and underpin zero trust networking principles. No matter your underlying technology stack, cert-manager can be used to help you to standardise your approach to certificate management. Enter mTLS (between pods). Related posts.
If you’re curious about technology enjoy problem-solving, want to save the world from cyberattacks and effectively collaborate with people who might think differently but are on the same mission as you, you can enjoy an amazing career in cybersecurity. Join solutions and webinars where you can ask questions of cyber experts.
John Checco, Resident CISO at Proofpoint, says it is usually the amount of drama involved. That was interesting that all the technology that we have didn't catch the majority of these insider threats. Insider threat webinar now available on-demand. As people exfiltrated data more slowly, they have a better success rate.
Why You Should Act Now For CISOs and their teams, the most obvious implication is how they will approach the management of digital certificates, with shorter lifespans. SCM also integrates with a broad set of technology vendors. Plus, register for Sectigo’s upcoming March 30 webinar, 90 Day Certificate Validity, here.
Recent HelpSystems research with CISOs in global financial service organizations found that almost one-third believe data breaches have the potential to cause the most damage over the next 12 months. Most important is the Adaptive Redaction technology within the Clearswift DLP. tag='></a> <a href='/blog?tag='></a>
This installment features Jason Lau , CISO for Crypto.com and an official member and contributor on the Forbes Technology Council. I am currently the Chief Information Security Officer (CISO) at Crypto.com, where I drive the company’s global cybersecurity and data privacy strategy. What job do you do today?
And get the latest on MFA methods, CISO trends and Uncle Sam’s AI strategy. Plus, a survey finds “shadow AI” weakening data governance. Dive into six things that are top of mind for the week ending Nov.
Indeed, Chris Roberts, virtual chief information officer and advisor to a number of companies and agencies as part of the HillBilly Hit Squad, warned during a recent SC webinar panel discussion: “We think we have problems now. Technology can be used to create more layers, even layers within layers, without additional infrastructure.”.
We have a number of upcoming events planned for April 2023, including: RSA Conference, DevSecOps Days, and BSides Webinar: How to Increase Test Coverage With Mayhem for API Speed vs. Resilience: Making the Right Trade-offs for Software Security Securing Open Source Software University Hackathon Read on to learn more about April’s events. .”
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content