Remove InfoSec Remove Risk Remove Technology
article thumbnail

Demand, CyberInsurance, and Automation/AI Are the Future of InfoSec

Daniel Miessler

2021-2030) A Surge in Demand for InfoSec people will result in many more professionals being trained and placed within companies, likely using more of a trade/certification model than a 4-year university model. That’s the distant future of InfoSec, with humans playing less and less a part in the equation as time goes on.

InfoSec 255
article thumbnail

Thinking About the Future of InfoSec (v2022)

Daniel Miessler

The ideas will cover multiple aspects of InfoSec, from organizational structure to technology. Technology. At the highest level, I think the big change to InfoSec will be a loss of magic compared to now. Technology. HT to Jeremiah Grossman to also being very early to seeing the role of insurance in InfoSec.

InfoSec 180
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA Order Highlights Persistent Risk at Network Edge

Krebs on Security

Mandiant said the attackers will continue to change their tactics and malware, “especially as network defenders continue to take action against this adversary and their activity is further exposed by the infosec community.” “COVID-19 extended the life of these companies and technologies, and that’s unfortunate.”

Risk 243
article thumbnail

CISA releases Insider Risk Mitigation Self-Assessment Tool

Security Affairs

The US CISA has released a new tool that allows to assess the level of exposure of organizations to insider threats and devise their own defense plans against such risks. The tool elaborates the answers of the organizations to a survey about their implementations of a risk program management for insider threats. Pierluigi Paganini.

Risk 123
article thumbnail

Iterative scientific infosec

Notice Bored

There is a strong argument to facilitate much more sharing of information about information risk and security, incidents, controls etc. So, this morning I've been thinking about the applications of those principles and mechanisms to information risk management, putting infosec under the microscope.

InfoSec 74
article thumbnail

Managing Cybersecurity Risk in M&A

Cisco Security

As Technology Audit Director at Cisco, Jacob Bolotin focuses on assessing Cisco’s technology, business, and strategic risk. Bolotin champions the continued advancement of the technology audit profession and received a master’s degree in cybersecurity from the University of California Berkeley.

Risk 114
article thumbnail

Cyber Playbook: Information Technology vs Operational Technology – How to Leverage IT to Secure Your OT Systems

Herjavec Group

Information Technology (IT) primarily refers to hardware, software, and communications technologies like networking equipment and modems that are used to store, recover, transmit, manipulate, and protect data. . Operational technology has seen innovations that allowed it to become safer, more efficient, and more reliable.