Tag: Everyone’s Blog Posts – CISO Platform

[Webinar] Ransomware And Email Security

Read the original article: [Webinar] Ransomware And Email Security This webinar will provide a detail of Ransomware, it’s effect and preventive measures. Key Takeaways: o How we can be protected from Ransomware attacks. o What are the best practices, which…

IT And Knowledge Creation

Read the original article: IT And Knowledge Creation [Posted on behalf Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author | University of Tennessee health science center] IT and Knowledge CreationThis article focuses on the effective…

Connected Device Security: A Growing Threat

Read the original article: Connected Device Security: A Growing Threat [Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services Information Security Media Group (ISMG) ] Many cybersecurity analysts have warned of the rapidly emerging threat from an expanded IoT space. And…

Innovation & Growth

Read the original article: Innovation & Growth [Posted on Behalf of Subbu Iyer, Founder and chief Designer Hreemm] The Process of InnovationGlobally the understanding of the Process of Innovation has been driven as a populist understanding of Ideas Management. That probably worked…

Can You Do Security Without Full-time Security People?

Read the original article: Can You Do Security Without Full-time Security People? [Posted on Behalf of Anton Chuvakin, Security Strategy – chronicle Google] This post is a convergence of a few things: our recent foray into more basic security areas (such as…

Changes Set to Impact CISOs In a Post-Pandemic World

Read the original article: Changes Set to Impact CISOs In a Post-Pandemic World [Posted on behalf of Gary Hayslip CISO  Softbank Investment advisor] I recently published on LinkedIn an article about the foundational elements of the CISO role that will not change…

Security Predictions for 2020

Read the original article: Security Predictions for 2020 [Posted on behalf of Steve King, Director, Cybersecurity Advisory Services  Information Security Media Group (ISMG) ] By now, you’ve been inundated with security predictions from all the major vendors and talking heads. I won’t…

How to Build A Business Case for a Deception Tool?

Read the original article: How to Build A Business Case for a Deception Tool? [Posted on behalf of  Anton Chuvakin, Security Strategy – chronicle Google] How do you develop a business case for a DECEPTION TOOL?! I just went through a whole…

You Pay More for Less! When You Don’t Know!

Read the original article: You Pay More for Less! When You Don’t Know! [Posted on Behalf of Archie Jackson, Senior Director and Head of IT & IS Incedo Inc ] If you run a website or plan to run one, read on…..What…

How CISOs Build Their Road Map

Read the original article: How CISOs Build Their Road Map [Posted on behalf of Gary Hayslip,  CISO Softbank Investment advisor ]   Recently, I addressed a group of security professionals, and our discussion was on how CISOs develop their strategy. I…

Top Cyber Security Industry Predictions for 2020

Read the original article: Top Cyber Security Industry Predictions for 2020 [Posted on behalf of Dan Lohrmann, Chief Strategist & Chief Security Officer Security mentor, Inc.]   Whether you call them cybersecurity forecasts, online risk trends or security predictions, here’s a…

So you want to be a CISO, an approach for success

Read the original article: So you want to be a CISO, an approach for success Posted on Behalf of Gary Hayslip,  CISO, Softbank Investment advisor]   I have been writing and speaking about the role of the Chief Information Security Officer…

Work-Life Balance is NOT what you need

Read the original article: Work-Life Balance is NOT what you need [Posted on Behalf of Archie Jackson,  Senior Director and Head of IT & IS, Incedo Inc]   Balance is a situation in which different elements are equal or in the…

Introduction to IoT Phenomenon (Internet of Things)

Read the original article: Introduction to IoT Phenomenon (Internet of Things) [ Posted on Behalf of Rajeev Shukla, Chief Strategy officer Castellum Labs] Computing and its pervasivenessIn the last few decades more and mode devices have been connected to the internet…

Leadership Traits & Principles

Read the original article: Leadership Traits & Principles [Posted on behalf of Dennis Leber, Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author  University of Tennessee health science center]     Everyone loves a great leader development…

[Webinar] BYOD Security

Read the original article: [Webinar] BYOD Security Key Points To Be Discussed : 1. Introduction 2. Inscope items 3. Statistics on BYOD issues worldwide 4. Why we need to think about protection 5. Used Cases before going to create a…

[Webinar] BYOD Security

Read the original article: [Webinar] BYOD Security Key Points To Be Discussed : 1. Introduction 2. Inscope items 3. Statistics on BYOD issues worldwide 4. Why we need to think about protection 5. Used Cases before going to create a…

Why Ransomware was the Top 2019 Cybersecurity Story

Read the original article: Why Ransomware was the Top 2019 Cybersecurity Story [Posted on Behalf of Dan Lohrmann, Chief Strategist & Chief Security Officer, Security mentor, Inc.] Another eventful year online, with more data breaches, malware battles and identity thefts. But the…

So you want to be a CISO, an approach for success

Read the original article: So you want to be a CISO, an approach for success Posted on Behalf of Gary Hayslip,  CISO, Softbank Investment advisor]   I have been writing and speaking about the role of the Chief Information Security Officer…

Work-Life Balance is NOT what you need

Read the original article: Work-Life Balance is NOT what you need [Posted on Behalf of Archie Jackson,  Senior Director and Head of IT & IS, Incedo Inc]   Balance is a situation in which different elements are equal or in the…

Introduction to IoT Phenomenon (Internet of Things)

Read the original article: Introduction to IoT Phenomenon (Internet of Things) [ Posted on Behalf of Rajeev Shukla, Chief Strategy officer Castellum Labs] Computing and its pervasivenessIn the last few decades more and mode devices have been connected to the internet…

Leadership Traits & Principles

Read the original article: Leadership Traits & Principles [Posted on behalf of Dennis Leber, Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author  University of Tennessee health science center]     Everyone loves a great leader development…

A Quantified Approach to Cybersecurity Risk Management

Read the original article: A Quantified Approach to Cybersecurity Risk Management [Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services  Information Security Media Group (ISMG) ] Cybersecurity Risk Assessment should be a hot topic these days. How else can you not…

Is the Coronavirus Creating Data Breaches?

Read the original article: Is the Coronavirus Creating Data Breaches? [Posted on Behalf of Dan Lohrmann Chief Strategist & Chief Security Officer Security mentor, Inc. ] From telework mistakes, to virus-related phishing links, to new work processes to nation-state hackers, here’s how…

Incident Response. Missing?

Read the original article: Incident Response. Missing? [Posted on Behalf of Rajeev Shukla, Chief Strategy officer Castellum Labs] Incident Response. Picture of a Failed One !Recent Wipro fiasco on Breach reported by noted security researcher, Brian Krebs, is a study in either…

When Will You Go Back To The Office – If Ever?

Read the original article: When Will You Go Back To The Office – If Ever? [Posted on Behalf of Dan Lohrmann, Chief Strategist & Chief Security Officer Security mentor, Inc.] As the governments lift stay-at-home emergency orders, organizations are grappling with what…

Innovation & Growth

Read the original article: Innovation & Growth [Posted on Behalf of Subbu Iyer Founder and chief Designer Hreemm ] The Process of InnovationGlobally the understanding of the Process of Innovation has been driven as a populist understanding of Ideas Management. That probably…

Strategy – How CISOs Build Their Road Map

Read the original article: Strategy – How CISOs Build Their Road Map [Posted on behalf of Gary Hayslip CISO  Softbank Investment advisor] Recently, I addressed a group of security professionals, and our discussion was on how CISOs develop their strategy. I found…

Curve-jumping” in Security Operations and SOAR Technologies

Read the original article: Curve-jumping” in Security Operations and SOAR Technologies [Posted on Behalf of  Anton Chuvakin Security Strategy – chronicle  Google ]  Lets think about this together — can you really jump to the “next curve” in security, or do you…

The 10 Worst Cybersecurity Strategies

Read the original article: The 10 Worst Cybersecurity Strategies Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to…

Security in Super Connected World (IoT Security)

Read the original article: Security in Super Connected World (IoT Security) [Posted on Behalf of Rajeev Shukla, Chief Strategy officer Castellum Labs ] Introduction to IoT Phenomenon (Internet of Things)Computing and its pervasivenessIn the last few decades more and mode devices have…

A Mentor’s Advice

Read the original article: A Mentor’s Advice [Posted on Behalf of Gary Hayslip,  CISO Softbank Investment advisor ] In my 20+ years as an information technology and cybersecurity professional, I have had the privilege to work with and mentor some amazing people.…

Cross-post: About Threat Intel Retro-Matching

Read the original article: Cross-post: About Threat Intel Retro-Matching [Posted on Behalf of  Anton Chuvakin, Security Strategy – chronicle Google]  So you recall my recent post about TI matching to security telemetry like logs in near real-time? I did say that most…

Teaching AI to be Evil with Unethical Data

Read the original article: Teaching AI to be Evil with Unethical Data An Artificial Intelligence (AI) system is only as good as its training. For AI Machine Learning (ML) and Deep Learning (DL) frameworks, the training data sets are a crucial…

CISO Report: Monthly Breach Report June 2020

Read the original article: CISO Report: Monthly Breach Report June 2020 This is a cross post from original source at FireCompass …   Advertise on IT Security News. Read the original article: CISO Report: Monthly Breach Report June 2020

Killer Drones to be Available on the Global Arms Markets

Read the original article: Killer Drones to be Available on the Global Arms Markets Turkey may be the first customer for the Kargu series of weaponized suicide drones specifically developed for military use.  These semi-autonomous devices have been in development since…

Data Privacy and Biometrics

Read the original article: Data Privacy and Biometrics [Posted on Behalf of Steve King,  Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ] Biometrics, while an element of data security, is a unique attribute that should be treated in…

The CISO Job and Its Short Tenure

Read the original article: The CISO Job and Its Short Tenure [Posted on Behalf of Gary Hayslip,  CISO Softbank Investment advisor] Recently, I have written and spoken on the subject of CISO burnout. I have stated my belief that the job is…

Who will pay for your cyber liabilities?

Read the original article: Who will pay for your cyber liabilities? [Posted on Behalf of Pushkal Mishra AVP IT & CISO HDFC ERGO Health Insurance Ltd) The 2019 edition of Symantec threat report reveals that:– One in 10 URLs are malicious– More…

19 Things I followed in 2019 & continue to…

Read the original article: 19 Things I followed in 2019 & continue to… [Posted on Behalf of Archie Jackson, Senior Director and Head of IT & IS Incedo Inc] C>O>P>I>S: Customer is the center of the universe. Everyone around us are customers…

Management in time of AI and ML

Read the original article: Management in time of AI and ML [Posted on Behalf of Rajeev Shukla, Founder and CEO, Castellum Labs]  The world around you is altering in irrevocable ways. Software/s is eating the whole sectors, not just the jobs,…

The CISO Job and Its Short Tenure

Read the original article: The CISO Job and Its Short Tenure [Posted on Behalf of Gary Hayslip,  CISO Softbank Investment advisor] Recently, I have written and spoken on the subject of CISO burnout. I have stated my belief that the job is…

Who will pay for your cyber liabilities?

Read the original article: Who will pay for your cyber liabilities? [Posted on Behalf of Pushkal Mishra AVP IT & CISO HDFC ERGO Health Insurance Ltd) The 2019 edition of Symantec threat report reveals that:– One in 10 URLs are malicious– More…

19 Things I followed in 2019 & continue to…

Read the original article: 19 Things I followed in 2019 & continue to… [Posted on Behalf of Archie Jackson, Senior Director and Head of IT & IS Incedo Inc] C>O>P>I>S: Customer is the center of the universe. Everyone around us are customers…

Management in time of AI and ML

Read the original article: Management in time of AI and ML [Posted on Behalf of Rajeev Shukla, Founder and CEO, Castellum Labs]  The world around you is altering in irrevocable ways. Software/s is eating the whole sectors, not just the jobs,…

Are you working from home?

Read the original article: Are you working from home? [Posted on Behalf of Pushkal Mishra, AVP IT & CISO HDFC ERGO Health Insurance Ltd.] While the world is battling with COVID-19, Information security professionals have a double duty to do.1. Take all…

METT-T for the Information Security Leader

Read the original article: METT-T for the Information Security Leader [Posted on Behalf of Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author ] METT-T is an acronym for planning patrol mission utilized by the US…

AI in Cybersecurity? Closing In

Read the original article: AI in Cybersecurity? Closing In [Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ] “AI Needs to Understand How the World Actually Works”On Wednesday, February 26th, Clearview AI, a…

I’m a CISO, what’s next?

Read the original article: I’m a CISO, what’s next?  [Posted on Behalf of Gary Hayslip CISO Softbank Investment advisor] Over the years in my career, I have heard some variation of this question from many of my peers. Usually, the discussion starts…

Growing at the rate of Learning

Read the original article: Growing at the rate of Learning [Posted on Behalf of Subbu Iyer, Founder & chief designer architect  Hreemm]  An emperor was once gifted two baby peregrine falcons. These species are known for their speed and predatory skills. He…

Information Security Service Management (ISSM)

Read the original article: Information Security Service Management (ISSM) [Posted on Behalf of Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author ] It’s time for IS Service ManagementIT Service Management (ITSM) is nothing new to…

Why does the world have to be the same again?

Read the original article: Why does the world have to be the same again? [Posted on Behalf of Subbu Iyer, Founder and chief Designer Hreemm] Every other person is lamenting about world never ever going to be the same again. This of…

Coronavirus in the Dark

Read the original article: Coronavirus in the Dark [Posted on Behalf of Steve King, Director, Cybersecurity Advisory Services  Information Security Media Group (ISMG) ] So, yes. It is now very clear that the outbreak of the COVID-19 virus and the concomitant investor…

Expert Panel Discusses Cybersecurity in the New Normal

Read the original article: Expert Panel Discusses Cybersecurity in the New Normal Watch panelists Chris Roberts, G. Mark Hardy, and Matthew Rosenquist at VShield 2020 I had the honor to be on a distinguished panel with the incredibly knowledgeable G.…

Universal Aspects of the Evolving CISO Role

Read the original article: Universal Aspects of the Evolving CISO Role [Posted on Behalf of Gary Hayslip,  CISO Softbank Investment advisor] Currently, many of us security professionals are sheltered in place working from home, managing our security teams remotely as we help…

Move to Cloud: A Chance to Finally Transform Security?

Read the original article: Move to Cloud: A Chance to Finally Transform Security? [Posted on Behalf of Anton Chuvakin, Security strategy chronicle , Google] There is a lot of hilarity in how some organizations move to the cloud. Today, there are many…

Are you following the basics of security?

Read the original article: Are you following the basics of security? [Posted on behalf of Dinesh Kumar Aggarwal Founder | CISO | Architect | Cyber Security Practitioner | Information Security Blogger & Speaker] Every year, cyber security scenario is perky with…

Comparing Major Crises To COVID-19: A Teachable Moment

Read the original article: Comparing Major Crises To COVID-19: A Teachable Moment [Posted on behalf of Steve King Director, Cybersecurity Advisory Services at Information Security Media Group (ISMG) ISMG] Lessons from past financial crises might prepare us for the long and short-term…

Business Continuity Planning Made Simple

Read the original article: Business Continuity Planning Made Simple [Posted on behalf of Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author ] Business Continuity Planning (BCP) goes beyond Cybersecurity; however, cyber security leaders are often…

Prioritization in the VUCA World

Read the original article: Prioritization in the VUCA World [Posted on behalf of  Archie Jackson Senior Director and Head of IT & IS Incedo Inc.] Over the years, most of my friends and colleagues have expressed curiosity to understand about…

Riding the trend isn’t cool anymore

Read the original article: Riding the trend isn’t cool anymore [Posted on Behalf of Subbu Iyer, Founder and Chief Designer Hreemm] Trends are for the herdsThe current decade that will meld into history in the next 24 – 36 hours depending on…

Let’s talk about Cybersecurity Risks

Read the original article: Let’s talk about Cybersecurity Risks [Posted on Behalf of Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author ] I propose an altered view and mindset around riskI recently read a great…

Incident Response and coronavirus

Read the original article: Incident Response and coronavirus [Posted on Behalf of Dinesh Kumar Aggarwal Founder | CISO | Architect | Cyber Security Practitioner | Information Security Blogger & Speaker] Security Incident Response and and corona virus!There are a lot of…

Why does the world have to be the same again?

Read the original article: Why does the world have to be the same again? [Posted on behalf of Subbu Iyer Industry 4.0 Leader shaping the future with Design Thinking, Digital Transformation & Innovation Company – Hreemm] Every other person is lamenting about…

Webinar – Return to Office post COVID-19

Read the original article: Webinar – Return to Office post COVID-19 This session will give an insight on taking precautionary measures from Cyber Security and Data Privacy standpoint to ensure in strengthening IT Security, Protecting our Data and Safeguarding the…

Working from home? Your business is probably at risk…

Read the original article: Working from home? Your business is probably at risk… [Posted on Behalf of Sam Jones  Cyber-Man | Helping SMEs get 98% more secure] Hackers know you’re at home and they know your network is vulnerable…With the UK Government…

CISO — Role and Capabilities – Evolution Map

Read the original article: CISO — Role and Capabilities – Evolution Map [Posted On Behalf of Rajeev Shukla Chief Products Officer <> Chief Strategy Officer <> Chief Executive Officer Building Next Gen Cyber Security Venture at Stealth Mode ] CISO is…

CISO — Role and Capabilities – Evolution Map

Read the original article: CISO — Role and Capabilities – Evolution Map [Posted On Behalf of Rajeev Shukla Chief Products Officer <> Chief Strategy Officer <> Chief Executive Officer Building Next Gen Cyber Security Venture at Stealth Mode ] CISO is…

Misunderstanding the Economic Factors of Cybercrime

Read the original article: Misunderstanding the Economic Factors of Cybercrime A new study by Cambridge Cybercrime Centre titled Cybercrime is (often) boring: maintaining the infrastructure of cybercrime economies concludes that cybercrime is boring and recommends authorities change their strategy to…

COVID – 19 The Disrupter

Read the original article: COVID – 19 The Disrupter [Posted on Behalf of Dennis Leber Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author |] What have we learned from this Global event? Here are some of my…

Making your System Impenetrable with Penetration Testing

Read the original article: Making your System Impenetrable with Penetration Testing It cannot be argued that as the global march of digitization continues to grow unchecked, it has brought high convenience, shorter delivery times, cost-effectiveness, and unprecedented access to the…

Cloud Security Architecture

Read the original article: Cloud Security Architecture We all understand the significance of cloud when it comes to economies of scale, reduced time to market, operational effectiveness and ease with which you can deploy applications to it and most of…

THREAT MONITORING USE CASE APPROACH

Read the original article: THREAT MONITORING USE CASE APPROACH Threat hunting or monitoring is the practice of actively seeking out cyber threats in an organization or network. A threat hunt can be conducted during a security incident, or pre-incident time…