3rd Party Risk Management , Cybercrime , Fraud Management & Cybercrime

ISMG Editors’ Panel: Challenges for New CISA Leader

Discussion Also Tackles Vendor Security Issues
Clockwise, from top left: Tom Field, Anna Delaney, Scott Ferguson and Marianne Kolbasuk McGee

In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the challenges ahead for the new director of the U.S. Cybersecurity and Infrastructure Security Agency and vendor security risk management in the healthcare sector.

See Also: Best Practices to Protect Communication and Email Fraud with Technology

The editors - Tom Field, senior vice president, editorial; Anna Delaney, director, productions; Scott Ferguson, managing editor, GovInfoSecurity; and Marianne Kolbasuk McGee, executive editor, HealthcareInfoSecurity - discuss:

  • Highlights from an interview with the former acting executive director of CISA, Brandon Wales;
  • The greatest challenges ahead for Jen Easterly, who was confirmed this week by the Senate as the new CISA director;
  • The supply chain ransomware attack targeting Practicefirst, an Amherst, New York-based medical management services provider, which affected more than 1.2 million individuals.

The ISMG Editors' Panel runs on Fridays. Don't miss our previous installments, including the July 9 and July 2 editions, which respectively discuss the Kaseya ransomware attack and the FBI's assessment of cybersecurity trends.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.