The Joint Cyber Defense Collaborative may get a much-needed facelift in the coming months after experts and a cybersecurity advisory committee urged the U.S. Cybersecurity and Infrastructure Security Agency to improve its operational components and clarify its membership criteria.
CISOs face increasing legal and compliance responsibilities amid growing cybersecurity challenges. Ex-CSO Joe Sullivan of Ukraine Friends and Aravind Swaminathan of Orrick, Herrington & Sutcliffe discuss the need for fundamental processes and constant communication with stakeholders.
Edna Conway, CEO, EMC Advisors, and Wendy Nather, director, strategic engagements, Cisco, discuss the persistent challenges and evolving dynamics in cybersecurity. They emphasize the importance of historical awareness, effective information sharing and leveraging AI for predictive risk management.
Cybersecurity is a "team sport" requiring technology to align with robust policy frameworks to secure nations as well as organizations, said Marene Allison, CEO of Marene Allison Consulting. "All these pieces must come together - technology, government policy and corporate strategy," she said.
A new initiative in the U.S. is pairing college students with university researchers to strengthen cybersecurity defenses for resource-poor organizations and small businesses. The program serves as both an educational platform and a way for students to gain practical field experience.
The healthcare sector needs a 911-style cyber civil defense system that can help all segments of the industry, including under-resourced groups, to more rapidly and effectively respond to cyberattacks and related incidents, said Erik Decker, CISO of Intermountain Health and a federal cyber adviser.
The U.S. Government Accountability Office found that CISA lacks the skilled staff to effectively share information with critical infrastructure operators about threats. Also, the GAO found that the Pipeline and Hazardous Materials Safety Administration lacked an information-sharing process.
International organisations are racing to comply with evolving cybersecurity regulations amidst a surge in cross-border cyber-attacks. These regulations aim to fortify defenses against threats to data, finances, and reputation.
However, the complexity of directives often leaves CISOs and their teams feeling...
In establishing a robust security culture, the integration of security awareness and compliance training is vital. This cohesive approach bolsters the defense layer across digital and physical realms, reducing risks associated with noncompliance such as fines and reputational damage.
There's significant content...
Welcome to Google Cloud's Cybersecurity Edition of the First Annual Generative AI Survey, brought to you by Information Security Media Group (ISMG). This survey of over
400 business and cybersecurity professionals conducted in
H2 2023 comprises responses from two groups, business
leaders – comprising CIOs, board...
Business leaders and security leaders agree on
the importance of cybersecurity, but there are
significant differences in how the two groups
perceive and prioritize the threats and view the
role of the other party.
Previous studies on IoT and OT devices have primarily focused on internal components, neglecting open-source components that are crucial for internet and network connectivity, according to Stanislav Dashevskyi and Francesco La Spina, security researchers at Forescout Technologies.
In this special edition at Black Hat Europe 2023 in London, three ISMG editors cover the highlights of the conference, including a resounding call for better collaboration between government agencies and the private sector, regulatory trends, and the cautionary tale of ex-Uber CISO Joe Sullivan.
Steve Katz, the world's first CISO, died Saturday night while under hospice care in Long Island, New York. He left a strong legacy - not just as a pioneer and trailblazer in cybersecurity leadership but also as a beloved colleague and mentor who generously shared his time and wisdom.
Okta has paused product development and internal projects for 90 days to beef up its security architecture and operations for applications, hardware and third-party vendors. Okta will move to strengthen its cyber posture, including a security action plan and engaging with third-party cyber firms.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.