One of the most important recent developments by CISA has been the creation of the Joint Cyber Defense Collaborative, which is focused on operational private-public collaboration, says Kiersten Todt, CISA chief of staff.
Software bills of material, or SBOMs, are still "years away" from being ubiquitous, says Grant Schneider, senior director for cybersecurity services at Venable. He says it will take time for them to catch on, and a set of standards and other critical components for industry need to be defined.
The role was vastly different 10 years ago, and it will morph yet again 10 years from now. This makes the CISO's job the most challenging in the cybersecurity sector, says John Horn, cybersecurity practice director at Aite-Novarica Group. He shares highlights of recent research.
In an organization, people are the ones who develop and sustain organizational strategy. Talented people are discovering that it's possible to leave a toxic environment so they can breathe and thrive. Marco Túlio Moraes explores how to retain both talent and strategy.
Erwän Keräudy and Jeff Gore of CybelAngel say that due to cloud migration, people working remotely, and the connected ecosystem of suppliers, "the perimeter is dead." We need a comprehensive assessment of critical external threats, they say, including a scan of "the infrastructure of the internet."
To advance a more inclusive and diverse workforce in cybersecurity, it is imperative to consider "every person in the room," says Michael Cunningham, vice president and CISO of Graphic Packaging International LLC. He discusses ways for organizations to become more inclusive and diverse.
The Cyber Threat Alliance just celebrated its fifth birthday, and President and CEO J. Michael Daniel says the membership and information sharing both are growing at an impressive pace. He discusses the surge in ransomware and how organizations should respond.
Michael Lines is working with ISMG to promote awareness of the need for cyber risk management, and the CyberEdBoard is posting draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself." This chapter - the last in the series - is titled "Building an Effective Defense."
Though less eventful than its predecessor, 2021 was another blockbuster year for cybersecurity. With 2020’s scramble to enable remote working fading from memory, securing hybrid setups in the long term presented a new and complex challenge.
At the same time, cybercrime went prime time. High-profile cyber-attacks...
According to Accenture Security's new report titled "Elevating the Cybersecurity Discussion," only 38% of CEOs and CFOs are confident that over 75% of their organization is actively protected by their cybersecurity program. Ryan LaSalle discusses how to help the C suite understand cybersecurity.
Manufacturing is a huge industry with massive amounts of critical data and IoT surfaces, and it is also a lucrative target for cybercriminals. CyberEdBoard member Shankar Karthikason discusses how to secure your OT environment and build an effective cybersecurity program.
Each year, hundreds of cybersecurity professionals submit proposals to be a speaker at RSA Conference. And each year, we mine these proposals for trends and commonalities.
In our latest RSAC 2022 Trends eBook, we examine the data from this year’s submissions to provide an interesting glimpse into what will be on...
In this episode of "Cybersecurity Unplugged," Tim Danks of Global Risk Perspectives discusses issues around trusting our global supply chain, including the role of Huawei, the steps needed to secure critical infrastructure, and the process for determining a comfortable level of risk management.
Never have global financial institutions
faced such adversaries. The cybercriminal gangs now wield tools that
used to be the province of nation-states, and the nation-states now
engage in activities that once were owned by cybercrime. Scams
and schemes including account
takeover, denial of service and ransomware...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.