Human error is the most common portal for cybersecurity breaches. So it stands to reason that human talent is the most valuable defense against attacks.
But how can organisations reduce risk by making humans the strongest link in the cyber defense line?
View this UK & EU Leadership Session lead by the Tech...
Many security practitioners take a check-box approach to cybersecurity, which prevents them from seeing the whole system. John Remo of Warner Music Group discusses how to break out of this pattern and use critical and abstract thinking to examine the deeper workings of the system.
By baselining cyber maturity, one can create an organization's risk profile - and that is the key to being able to build a road map for prioritizing and addressing business risk. ISACA's Brian Fletcher shares insights on establishing the maturity goals for one's unique organization.
Cybersecurity has the board's attention these days - the daily headlines assure that. But how does a security leader keep that attention and also win over other key stakeholders in the enterprise? Kelly Hood shares guidance rooted in ISACA's CMMI Cybermaturity Platform.
The debilitating Colonial Pipeline attack in 2021, which cost the organization $4.4 million to restore the data, highlights the devastating consequences of ransomware and why nearly one in three companies hit with an attack is likely to pay the fee.
Download this CISO Guide from Abnormal Security CISO Mike...
Most security leaders know that an effective security awareness program can play an outsized role in reducing risk. But measuring—and communicating—the impact of your security awareness program to executives is not always easy. This e-book explores the ins and outs of security awareness programs to help you build,...
While approximately ⅔ of infosec professionals believe that staffing shortages are putting their organizations at risk, the depth of the cybersecurity skills gap is both wider and deeper than is often fully appreciated. From the myriad of complicated technologies we expect our security experts to implement and...
The Town of Gilbert’s Office of Information Technology manages 1,500 employees and provides technical services for the community’s 260,000 residents.
In addition to maintaining hardware, such as municipal computers, telephones, and networking systems, they are responsible for providing connectivity for a wide...
The Zero Trust security model. It's not a single technology, but a programmatic approach that integrates elements of identity, network, application, data and cloud security to support a secure and agile business environment.
Over the span of mere weeks in 2020, Zero Trust went from being marketing's pet buzzword to...
Garry Hargreaves, director of the NATO Communications and Information - or NCI - Academy, discusses the institution's mission to train and educate NATO’s cyber workforce by creating an "enduring NATO cyberspace curriculum."
Digital transformation,
cloud migration, and the work from anywhere
model are opening up a world of possibilities
for organizations, pushing them to reinvent
core business models and unlock new revenue
streams.
On the other hand, from SolarWinds
to the recent Colonial Pipeline attack, it has
been raining...
80% of companies will allow employees to work from home or the office. We call this “hybrid work.” This has created a need for secure access services that work consistently across locations so users can work from anywhere, can scale easily without complexity, and can minimize risk of cyber threats like ransomware...
So what happens when you as a security leader get that call to protect the cybersecurity of executive leaders/board members outside the office? What are the right and wrong responses? Chris Pierson of BlackCloak shares new insight on executive protection best practices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.