Remove Cyber Attacks Remove Cyber Risk Remove InfoSec
article thumbnail

Seeds of Destruction: Cyber Risk Is Growing in Agriculture

The Security Ledger

In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyber risk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »

article thumbnail

Secure Communications: Relevant or a Nice to Have?

Jane Frankland

When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. For CISOs and cyber risk owners, this isnt just a riskits a gamble no one can afford to take.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 232: Log4j Won’t Go Away (And What To Do About It.)

The Security Ledger

Related Stories Spotlight: How Secrets Sprawl Undermines Software Supply Chain Security Episode 227: What’s Fueling Cyber Attacks on Agriculture ? Tomislav tells us why issues related to Log4j won’t be going away anytime soon and how organizations must adapt to deal with the risk it poses. Read the whole entry. »

article thumbnail

Episode 162: Have We missed Electric Grid Cyber Attacks for Years? Also: Breaking Bad Security Habits

The Security Ledger

» Related Stories Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy. If you believe the headlines, the first known disruptive cyber attack against the U.S.

article thumbnail

Spotlight Podcast: CSO Chris Walcutt on Managing 3rd Party OT Risk

The Security Ledger

In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyber risks to OT environments. Read the whole entry. »

CSO 59
article thumbnail

Cyber CEO: How to Get Executive and Board Level Buy-In for Cybersecurity

Herjavec Group

InfoSec professionals tend to describe the benefits of a strong cybersecurity program with technical jargon and acronyms. Having been on both sides of the equation as the infosec executive and the enterprise leader, I can confidently say the key is to speak the language of the executive team and board. Believe me – I’ve been there !

article thumbnail

Cyber Playbook: Information Technology vs Operational Technology – How to Leverage IT to Secure Your OT Systems

Herjavec Group

But technological advancement inherently results in greater cyber risk, and today’s OT systems are more vulnerable than ever. . As threat actors continue to target critical infrastructure and industrial assets, we have seen ICS cyber-attacks increase in frequency and sophistication.