The city of Atlanta's ransomware outbreak cleanup and response tab has hit $2.6 million after a March attack froze corporate servers, employees' PCs and resident-facing portals. Some security experts say the breach response funds would have been put to better use preventing the outbreak in the first place.
For years, Dawn Cappelli studied and wrote about the insider threat. Then she went to Rockwell Automation and built an insider program. She discusses the program's success and her expanded role as vice president and CISO.
The average tenure of a CISO can be brief - especially in the wake of a breach. What should security leaders do from day one to get a good handle on the job? Joel de la Garza, CISO of Box, offers career advice.
As corporate information silos fall, traditional approaches to governance, risk and compliance are giving way to the new category of integrated risk management solutions. Vivek Shivananda, CEO of Rsam, discusses the evolution.
"Digital transformation" is the theme of the year, but it comes with specific cybersecurity challenges - and they put a new burden squarely on the shoulders of the CISO, says Fortinet's Jonathan Nguyen-Duy.
We have been talking about the cybersecurity skills gap for a decade, but the pain is truly being felt now as businesses churn out new apps with insufficient security, says WhiteHat Security's Craig Hinkley. What is machine learning's role?
To effectively understand the impact of security programs and communicate changes to key decision makers, companies need tools such as security ratings that provide a quantifiable, objective view of cybersecurity performance over time.
Register for this webinar to learn about:
The importance of using security...
When it comes to building an effective cybersecurity team, it isn't just about acquiring the right technology and business skills, says LinkedIn CISO Cory Scott. It's also about obtaining the right people who have defined their own personal narrative.
Technological advances that are sweeping the financial sector by storm have brought about new ways for users to access their data on the go but it also presents new challenges for financial institutions to protect the personal data of their customers. Every financial institution needs to implement a comprehensive...
Are you interested in how your peers are dealing with increased breaches, vulnerabilities and encrypted traffic?
Download this report and learn:
How to reduce incident response times and dependency on skilled security personnel;
Key insights into the cyberthreat landscape;
How other security pros are protecting...
At its core, HIPAA compliance is simply about maintaining patient privacy by ensuring the appropriate access to and use of patient data by your users. Electronic Health Record (EHR) solutions provide detail around when patient data is accessed, but without visibility into what users do with sensitive patient data...
One of the most important priorities for a CISO is having a place at the table with the board of executives, says John Petrie of NTT Security. "It's very helpful to have interaction with the board so when things like budgeting or things like how you're going to change your programming come up, they are attuned to what...
CISOs increasingly are summoned to present to their Boards of Directors. But too often these presentations fail to frame the right topics with the right metrics.
Download this eBook on addressing the Board and learn about:
Common challenges security and risk teams face when reporting to the Board;
Key areas of...
Armed with stolen personal data, cybercriminals can easily bypass conventional identity authentication methods. So how can organizations strengthen authentication without harming customer experience? Shaked Vax of IBM Security shares insights.