Amy Herzog, chief information security officer for Ads and Devices at Amazon, shares how her cybersecurity team accelerates product development by integrating security from the start to secure customer data on popular consumer devices such as Ring and Alexa.
Matt Gordon-Smith has more than 25 years of information security experience and has led security programs. He says networking and relationship-building are critical to career success, but many aspiring CISOs face a major obstacle to interacting with other leaders: imposter syndrome.
Shervin Evans began his career as a programmer but he always knew his future was in cybersecurity. Now, 20 years later as an information security officer, he evangelizes about cybersecurity to employees in his organization, his family and the broader community.
Understanding business goals is key to aligning cybersecurity strategies, said Erik Hart, CISO at commercial real estate services firm Cushman & Wakefield. Hart stressed the importance of security leaders becoming solution finders who integrate cybersecurity with business operations.
As cloud computing, DevOps and automation continue to evolve, the lines between IT functions are fading, making security integral to these processes. Hiren Dave, CIO and CISO at Essen Health Care, shares how combining the roles of CIO and CISO improves risk management and communication.
The STAR - Situation, Task, Action, Result - method is a widely used framework for answering behavioral interview questions. It allows job candidates to present their experiences in a structured way, making it easier for interviewers to understand their problem-solving skills and real-world impact.
The healthcare sector is plagued by increasingly complex cyberthreats, and simply meeting compliance standards is not doing enough to protect sensitive healthcare data, according to Christopher Frenz, assistant vice president of IT security at Mount Sinai South Nassau.
John F. Banghart has spent 30 years in cybersecurity, and he appreciates the importance of creative thinking, upskilling and collaboration. Looking back on the Heartbleed vulnerability, Banghart said the incident demonstrates the need to address software supply chain risks causing problems today.
Welcome to Information Security Media Group's Black Hat and DEF CON 2024 Compendium featuring latest insights from the industry's top cybersecurity researchers and ethical hackers, as well as perspectives from CEOs, CISOs and government officials on the latest trends in cybersecurity and AI.
George Chacko, executive director of information security and compliance at New York Blood Center, shares his journey in cybersecurity, the challenges for nonprofit organizations with limited budgets and resources, and collaborative initiatives to improve security programs.
When executives fully understand the potential impact and cost of cyberthreats, they can better assign the necessary resources to combat them. Learn about how Verizon's CRQ can help to improve an organization's cybersecurity investments and resilience.
In the latest weekly update, ISMG editors discussed the evolving disclosure responsibilities of CISOs, yet another ransomware attack targeting the healthcare sector, and Mimecast's latest strategic acquisition as part of its broader expansion efforts.
Welcome to Information Security Media Group's Infosecurity Europe 2024 Compendium featuring cybersecurity insights from industry's top researchers, CEOs, CISOs, government leaders and more. Inside this 30-page guide, you'll find links to dozens of videos created by ISMG.Studio.
As the chief privacy officer at UChicago Medicine, Karen Habercoss likes to tell her peers, "I know more about security than the average bear." And her knowledge has been put to the test in recent years, with the adjustment to remote work, telehealth and digital transformation.
David Gee, board risk adviser, non-executive director and author, shares leadership lessons from his career in his latest book, "The Aspiring CIO and CISO." He discusses his approach to managing cybersecurity risks, engaging with teams and simplifying communication.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.