This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Started by infosec professionals, Peerlyst takes the characteristics of B2B communications we’ve become accustomed to on Twitter and LinkedIn and directs it toward cybersecurity. Related: Automating threat feed analysis Peerlyst is another step in that direction.
One Identity embodies three major features we judges look for with the potential to become winners: understanding tomorrows threats today, providing a cost-effective solution and innovating in unexpected ways that can help mitigate cyberrisk and get one step ahead of the next breach, said Gary S. Ackerman Jr.
In this episode of the podcast (#213): Molly Jahn of DARPA and University of Wisconsin joins us to talk about the growing cyberrisk to the Food and Agriculture sector, as industry consolidation and precision agriculture combine to increase the chances of cyber disruption of food production. Read the whole entry. »
In partnership with senior executives, they need to pay close attention to the risks their companies face and the strategies those companies put in place to comply. As the rules were authorized in late 2023, we shared what we see as the implications for infosec leaders. View cyberrisk as business risk.
Ransomware negotiators, cyberrisks to the financial system, and why traditional passwords are here to stay - catch up on all of the week's infosec news with the Friday Five!
When data breaches escalate, cyber-attacks grow more sophisticated, nation states ramp up their digital warfare, and regulations tighten the noose, staying ahead isnt just an optionits your only line of defence. Amid a backdrop of increasingly sophisticated and frequent cyberattacks, APTs are a growing concern for CISOs and cyberrisk owners.
Effective cyber-incident response means working well with legal. Matt Dunn, associate managing director for cyber-risk at Kroll, lays out how to do it.
Cybersecurity professionals have various views on last week's news from the United States Securities and Exchange Commission (SEC) when it surprised the InfoSec community and the C-suites of corporate America.
Jack Whitsitt, former InfoSecRisk Quantification Program Architect at. Freddie Mac, joins Ostrich Cyber-Risk as the Director of Risk. The post Ostrich Cyber-Risk Welcomes Risk Management Expert Jack Whitsitt as Director of Risk Quantification appeared first on Security Boulevard.
Rather than rely solely on factors like compliance or case law developing over time, embracing a risk management coordination role can help insurers take the fight to ransomware. Have insurers and infosec professionals coordinate closely on security risk metrics.
The post Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s Challenges appeared first on The. Fixing InfoSec Demands Scale, Diversity. Read the whole entry. » The information security industry is simultaneously robust and beset by problems and challenges.
This morning, Critical Start released its first ever CyberRisk Landscape Peer Report , which explores some of the major concerns and challenges currently confronting cybersecurity leaders as they manage risk within their organizations. Here are some comments on the cyberrisk landscape from cybersecurity vendor experts.
Tomislav tells us why issues related to Log4j won’t be going away anytime soon and how organizations must adapt to deal with the risk it poses. Episode 218: Denial of Sustenance Attacks -The CyberRisk To Agriculture. Supply Chain Risks: The New Normal. Tomislav Peri?in Log4j: A Very Popular Library.
Cyber-disclosure statements noting how long a company can go without a breach can help customers understand the reality of cyber-incidents and their exposure to loss.
And Rob Joyce, the head of NSA Cyber, was also spreading the news: From there, the announcements kept pouring out. Minecraft warned users to secure Java versions of the game: Amazon Web Services posted about the new cyberrisk on its blog: "This vulnerability is severe and due to the widespread adoption of Apache Log4j, its impact is large.".
Matt Dunn, associate managing director in Kroll's CyberRisk practice, discusses options for securing RDP, which differ significantly in terms of effectiveness.
These requirements are a great example of how cyberrisk isn't purely a bits and bytes issue to be 'handled by the security team,'" Jamil Farshchi, EVP and CISO at Equifax, said in a LinkedIn post today about the NYDFS proposal. Senior 'cyber deciphers' are now vital ~> Professional, experienced strategic communicators who also.
BOSTON–( BUSINESS WIRE )– CyberSaint , the developer of the leading platform delivering cyberrisk automation, today announced that the company is seeking speaker submissions for its virtual STRONGER conference, set to occur September 13th-15th 2022. InfoSec 360. Abstracts for each of the themes can be found below.
The SEC announced its new cyber incident disclosure rules on July 26, 2023, when it appeared the rules were effective immediately. We covered the new rules on July 31, with some thoughts from InfoSec leaders. Immediately or not, Dec. 15 is now here, and the new rules will be in effect.
A seemingly arcane topic, every organization should have vulnerability management as top-of-mind when it comes to managing cyberrisk. Finnish infosec pros organized to track and protect patients from further abuse. Why should organizations pay attention? For American organizations, only the GDPR wake-up call in 2018 compares.
It has to do with our evolving and still immature system of rating (and therefore thinking about) cyberrisk. How does a flaw potentially affecting the integrity of printer management application get a “critical” severity rating and one affecting the integrity and operation of anesthesia machines get a “moderate” severity rating?
We talk about the growing demand for security automation tools and how the chronic cyber security talent shortage in North America and. Read the whole entry. »
Brennan is speaking at SecureWorld Chicago on June 8, tackling the topic of "I Can See Clearly Now, the Threats Are Gone: The State of InfoSec and Threat Intelligence Today." Botts is Director of the Global Cyber Security Program at University of St. He, too, is speaking on a panel at SecureWorld Houston on May 18.
In this Spotlight Podcast, host Paul Roberts talks with Chris Walcutt, the CSO of DirectDefense about the rising cyber threats facing operational technology (OT) and how organizations that manage OT - including critical infrastructure owners can best manage increased cyberrisks to OT environments. Read the whole entry. »
InfoSec professionals tend to describe the benefits of a strong cybersecurity program with technical jargon and acronyms. Having been on both sides of the equation as the infosec executive and the enterprise leader, I can confidently say the key is to speak the language of the executive team and board. Believe me – I’ve been there !
What is the CISA: Cyber Essentials Toolkit? And the Cyber Essentials Toolkit is a set of modules concentrating vital advice for IT and InfoSec into bit-sized pieces for employees and leaders to implement. CISA says it wants to break cybersecurity down to a series of essentials.
The post Episode 207: Sarah Tatsis of BlackBerry on finding and Keeping Women in Cyber. Episode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a CyberRisk. Read the whole entry. » to foster awareness of cybersecurity as a field and discipline.
The post Episode 207: Sara Tatsis of Blackberry on finding and Keeping Women in Cyber. Episode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a CyberRisk. Read the whole entry. » to foster awareness of cybersecurity as a field and discipline.
Cyber insurance becomes mainstream discussion. As cyberattacks have become more costly and more challenging to track, cyber insurance has gained prominence across the industry. The cyber insurance market is expected to reach around $20B by 2025.
The proliferation of attacks - 66% of organizations were hit in the past year - and the ability for threat actors to more easily execute these attacks at scale, makes ransomware “ arguably the biggest cyberrisk facing organizations today.” The problem is putting those strategies into practice is easier said than done.
Ultimately, he believes “this is good for businesses as, through the insurance process, they will gain better visibility into their cyberrisks and measures they can deploy to keep digital operations secure and compliant to data privacy regulations.”. billion in premium. But much will rely on regulation.
With technological innovations like cloud computing, AI/ML, the Internet of Things, and more making cyberrisks even more complex, qualified talent is hugely in demand. Cybersecurity is one of the fastest-growing professions, with demand far outpacing supply even in normal economic conditions.
The CEO of BlackFog is quoted in the post as saying, "Adapting to a fast-changing landscape is key, however, and organizations need to ensure that their security teams are given the time and resources to devote to keeping pace with the latest thinking, frameworks and innovations designed to lower their cyberrisk.".
An integrated risk management (IRM) approach would have anticipated the vulnerabilities in such a critical artery of global trade, enabling stakeholders to foresee potential disruptions and implement contingency plans. Third-Party Reliance As businesses increasingly rely on third-party vendors , the associated risks also rise.
Since founding Cedric Leighton Associates, he has become an internationally known strategic risk expert. Leighton is also a founding partner of CYFORIX, specializing in the field of cyberrisk. He is responsible for strategic technology systems that support and enhance the lives of people and communities across the globe.
He is a trusted cybersecurity advisor for the Government of Canada, was a panelist on the recent White House Summit on Cybersecurity, is a cyber expert featured on CNN, CNBC, ABC, and BNN, and is Google’s Most Searched Person in Cybersecurity. Along with these contributions, Robert is active in a number of impactful infosec initiatives.
But technological advancement inherently results in greater cyberrisk, and today’s OT systems are more vulnerable than ever. . As threat actors continue to target critical infrastructure and industrial assets, we have seen ICS cyber-attacks increase in frequency and sophistication.
» Related Stories Spotlight Podcast: Security Automation is (and isn’t) the Future of Infosec Episode 159: Deep Fakes and Election (in)Security with ZeroFOX Spotlight Podcast: Rethinking Your Third Party CyberRisk Strategy. Read the whole entry. » grid happened in March of this year.
Knowing where data are and what level of criticality to assign to the data is difficult and important, and requires significant collaboration among information security (infosec) and IT operations teams.
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content