Application Security , Leadership & Executive Communication , Next-Generation Technologies & Secure Development

ISMG Editors’ Panel: Examining Open-Source Software Security

Also: Updating SOCs, Communicating With the Board
Clockwise, from top left: Suparna Goswami, Anna Delaney, Tom Field and Tony Morbin

In the latest weekly update, a panel of Information Security Media Group editors discusses key topics, including open-source software vulnerabilities, and provides insights on updating SOCs and communicating effectively with the board.

See Also: Cybersecurity workforce development: A Public/Private Partnership that enhances cybersecurity while giving hands-on SOC experience to students

The editors - Suparna Goswami, associate editor, ISMG Asia; Anna Delaney, director, productions; Tom Field, senior vice president, editorial; and Tony Morbin, executive news editor, EU - discuss:

  • Highlights from an interview with CISO Selim Aissi of Ice Mortgage Technology on successful communication with the board;
  • How organizations can update their SOCs to keep up with evolving cyberthreats;
  • Key takeaways from the recent Veracode State of Software Security report on open-source software vulnerabilities.

The ISMG Editors' panel runs weekly on Fridays. Don't miss our previous installments, including the June 18 and June 11 editions, which respectively discuss NATO's cybersecurity policy and the FBI's global cryptophone sting.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.