This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
The webinar will take place on Thursday, October 27, 2022 at 10:00 AM US Pacific time = 1 PM US Eastern. The webinar is FREE to join thanks to sponsorship by ColorTokens. The post What Should CISOs Prioritize In A Volatile Landscape?: Reserve your spot now at this RSVP link.
A new webinar featuring a multi-time Fortune 100 CISO and the CEO of LayerX, a browser extension solution, delves into this According to Gartner’s "Emerging Tech: Top 4 Security Risks of GenAI" report, privacy and data security is one of the four major emerging risks within generative AI.
The panelists shared that for CISOs sitting in the cyber leadership position, when new systems, platforms, and services are being procured, are they being procured while looking at the whole picture? The post Webinar Recap: Tool Sprawl – The Trillion Dollar Problem in Cybersecurity appeared first on Security Boulevard.
If your ultimate goal is the CISO chair, there’s several steps you need to follow to get there, and it’s smart to keep your eyes open for those opportunities along the way. Becoming a CISO is not something you’re going to be able to do right away. It is not possible to get a CISO status unless you have extensive field experience.
This statement was supported by lots of independent research, business press articles, webinars, local events, and even sessions at RSA and Black Hat crowing about the burgeoning relationship between CISOs, business executives, and corporate boards. To read this article in full, please click here (Insider Story)
In this live webinar, learn exactly how ransomware attacks unfoldfrom the initial breach to the moment hackers demand payment. Join Joseph Carson, Delineas Chief Security Scientist and Advisory CISO, who brings 25 years of enterprise security expertise. Cyber threats evolve daily.
Baptist Health CISO James Case shared insights on transforming cybersecurity through a risk-focused lens at a recent webinar we hosted. The discussion was moderated by Axio President, David White and Read More The post Webinar Recap: Critical Concerns for Healthcare Providers in 2024 appeared first on Axio.
Demand for Virtual CISO services is soaring. According to Gartner, the use of vCISO services among small and mid-size businesses and non-regulated enterprises was expected to grow by a whopping 1900% in just one year, from only 1% in 2021 to 20% in 2022! Offering vCISO services can be especially attractive for MSPs and MSSPs.
Reading Time: 5 minutes Recently, one of Sonrai Security’s Principal Solutions Architects, Mindy Schlueter, presented a webinar titled, ‘Continuously Changing Clouds Need Dynamic Security.’ The webinar took a four-prong approach in addressing the following agenda: Acknowledging the nonstop growing complexity of the cloud.
In our upcoming webinar on Tuesday, May 18th, "Why Your Legacy Cyber Platforms Can't Defend Against Modern Day Attacks," CEO of RAVENii, Jeff Shipley joins MixMode Head of Sales and Alliances Geoff Coulehan to uncover why the cybersecurity industry is failing to deliver on its promises.
On the one hand, security leaders and CISOs must be able to communicate strategies clearly – instructions, incident response plans, and security policies. Communication is a vital skill for any leader at an organization, regardless of seniority. For security leaders, this goes double. Communicating clearly works on multiple levels.
Are you curious what threats other CISOs are prioritizing right now? The post Webinar: State of InfoSec Q3 2022 appeared first on Security Boulevard. Do you know what the most in-demand security talent is right now?
This transition was a key topic in the recent webinar, The Next-Gen CISOs Guide to Cyber ROI , where experts discussed how organizations must adopt a risk-first mindset rather than a compliance-driven approach.
In a recent survey, 58% of CISOs of SMEs said that their risk of attack was higher compared to enterprises. So, you may be surprised to learn that small and medium enterprises (SMEs) are actually more frequent targets of cyberattacks. Many SMEs understand this risk firsthand. Yet, they don't have the same resources as enterprises –
The only threat more persistent to organizations than cyber criminals? The cyber security skills crisis. Nearly 60% of enterprises can’t find the staff to protect their data (and reputations!) from new and emerging breeds of cyber-attacks, reports the Information Systems Security Association (ISSA) in its 5th annual global industry study.
The upcoming webinar on "API ThreatStats™ Report: 2023 Year-In-Review" is your quickest way to learn about the latest trends and insights in API security. The post Webinar: Join us for the latest in API Threats on January 24, 2024 appeared first on Wallarm.
Nuspire recently announced findings from its annual research study revealing CISO challenges, priorities and key trends, as well as the drivers behind their purchasing decisions. Cunningham, CSO, hosted a webinar to review the data in detail and explain its implications. Read on to get the highlights. Read on to get the highlights.
Kristin Sanders, CISO for the Albuquerque Bernalillo County Water Utility Authority, revealed how New Mexico’s largest water and wastewater utility has been addressing the security challenge. The post Water utility CISO offers tips to stay secure as IT and OT converge appeared first on SC Media. Asaavedra32, CC BY-SA 3.0
Watch the (ISC)² webinar Protecting the Enterprise: 5 Components needed for Cybersecurity Training to get insights into who needs cybersecurity training and much more. Even if a company employs a Chief Information Security Officer (CISO) or Chief Security Officer (CSO), the position may still report to the CIO. Compliance Officer.
From the security challenges derived from the rise of artificial intelligence (AI) to the increasing legal liabilities placed on Chief Information Security Officers (CISOs), 2023 has been a busy year for the CISO community – and 2024 shows no signs of slowing down.
As an advisory CISO and part of Cisco’s strategy group, an essential part of my role is talking to CISOs from every kind of organization. As well as talking to CISOs, I also believe it is crucial to get perspectives from all sides. As well as talking to CISOs, I also believe it is crucial to get perspectives from all sides.
Watch the recent AWS and Cisco webinar to hear industry analysts, head CISO advisors, and AWS experts discuss shared responsibility, industry challenges and the ways in which other security teams are addressing the problem, and then visit the AWS Marketplace to see the latest Cisco Secure offerings. What should security teams do next?
As a product marketer, I spend most of my daily existence casting about for the perfect word to use in web copy, a webinar, or video script. Next Steps Listen to the conversation Wolfgang Goerlich, Advisory CISO, and I had during this on-demand webinar entitled “The Skeptic and the Data: How to Build Trust for Zero Trust”.
TL,DR: Check out our on-demand webinar Your Zero Trust Roadmap , where we outline the five key steps to secure user access to apps. For more information, check out our on-demand webinar Your Zero Trust Roadmap. So how does one go from MFA to full zero trust maturity? What does that journey look like?
Herzog “The merging of cybersecurity and data infrastructure has been compelling CIOs, CISOs and IT team leaders to rethink how to secure enterprise storage across hybrid multi-cloud deployments in light of increasing cyberattacks. Webinar On Demand. To watch Infinidat’s end-user webinar about the new solutions ?
on-demand webinar) The Data-Factor: Why Integrating DSPM Is Key to Your CNAPP Strategy (blog) When CNAPP Met DSPM (infographic) VIDEO Integrated DSPM features - enable data protection today! Thus, multi-cloud environments will become the norm in 2025, as organizations avoid vendor lock-in and increase their cloud options and flexibility.
Advisory CISO J. But not every passwordless product or system meets the security high bar administrators need. Your Journey Begins with Multi-Factor Authentication See the video at the blog post.
In late 2020, HelpSystems research with CISOs of global financial organizations revealed that 45% of respondents reported an increase in cyber-attacks since the pandemic first emerged. Almost half the CISOs in the HelpSystems’ research admitted that they had already increased their investment in secure collaboration tools. Featured: .
The Collaborative convened the Cloud Computing Task Force of roughly 15 CISOs in February. The Collaborative will introduce the task force developed tools to its members in July and host a public webinar this summer to discuss learnings with the broader community. Sean Gallup/Getty Images).
If you are not sure what the new security requirements are or if they affect your business or organization, don’t worry – we put together a webinar to help answer those questions. Watch the FTC Safeguards Rule Webinar. The definition of financial institutions includes non-financial institutions.
CISOs and IT security professionals have two options: 1. Watch our joint webinar The Secret to Scalable FIDO Success together with experts from Microsoft and Versasec now. Benefit from FIDO 2.1 standard (i.e., Manage FIDO keys easily and securely at each step of their lifecycle, from onboarding to revocation. Want to know more?
This webinar is suitable for organisations hoping to achieve ISO 27001 certification as well as those that have already achieved ISO 27001 certification and are thinking about becoming certified to ISO 27701. About the presenter: David Prendergast, Senior Security and Compliance Consultant.
Recent HelpSystems research with CISOs in global financial service organizations found that almost one-third believe data breaches have the potential to cause the most damage over the next 12 months. On-Demand Webinar: How to Enhance DLP in Office 365 Deep Dive Guide: Mitigating the Information Security Risks in Microsoft 365.
Tune into our upcoming webinar, “ Don’t Bet on Passwords, Use MFA to Insure Your Protection ,” to hear from Wolfgang Goerlich, an advisory CISO at Cisco Secure Access by Duo, an Matt Brooks, a Duo Product Marketing specialist. Or, if you’d like to experience Duo MFA for yourself, sign up for our free 30-day trial.
With New York’s CISO regulation, California’s Internet of Things (IoT) law and Europe’s General Data Protection Regulation (GDPR), the future of big data looks to be massively regulated. Thales also will host a webinar on Thursday, May 30 at 2:00 PM ET about “The Changing Landscape of Data Security for U.S. Federal Agencies.”
When e2e-assure, a TDR provider surveyed ITDMs and CISOs in the UK market, they found that 37% of buyers expressed frustration with this standard practice. Then, if you’re looking for an MDR provider, register for e2e-assure’s webinar, Choosing your MDR Provider: Boutique or Big Brand. Register here – [link]
John Checco, Resident CISO at Proofpoint, says it is usually the amount of drama involved. In the insider threat webinar, Checco also shared some fascinating insider threat case studies, which he investigated, including one where an employee quit on the spot when asked about their questionable activity. And much more.
We participated in B Sides last month, hosted a webinar on “How to Increase Test Coverage With Mayhem for API”, and hosted a university hackathon at UC Santa Cruz. Join the Mayhem team in our upcoming webinar to learn how to identify and address vulnerabilities in open-source libraries. When : May 24, 10 a.m. PT / 1 p.m.
Be sure to check out our upcoming webinar The State of Passkeys in the Enterprise on September 7th at 9am PST | 12pm EST. Passkeys and Cloud Sites Cloud sites are where the web applications are hosted. Today, we’re focusing on how passkeys compare to passwords when it comes to authenticating on cloud sites.
Recently, while co-hosting a webinar that kicked off Cybersecurity Awareness Month, a panelist commented that cybersecurity and privacy are team sports on a campus, much like our athletic teams.
In this episode, NetSPI’s Field CISO and host of the podcast Nabil Hannan tackles a pivotal topic: cybersecurity education. Tune in as we revisit the top podcast episodes that sparked debates, hit on industry best practices, and left you wanting to hit “repeat” on cyber defense.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content