When executives fully understand the potential impact and cost of cyberthreats, they can better assign the necessary resources to combat them. Learn about how Verizon's CRQ can help to improve an organization's cybersecurity investments and resilience.
In the latest weekly update, ISMG editors discussed the evolving disclosure responsibilities of CISOs, yet another ransomware attack targeting the healthcare sector, and Mimecast's latest strategic acquisition as part of its broader expansion efforts.
Welcome to Information Security Media Group's Infosecurity Europe 2024 Compendium featuring cybersecurity insights from industry's top researchers, CEOs, CISOs, government leaders and more. Inside this 30-page guide, you'll find links to dozens of videos created by ISMG.Studio.
As the chief privacy officer at UChicago Medicine, Karen Habercoss likes to tell her peers, "I know more about security than the average bear." And her knowledge has been put to the test in recent years, with the adjustment to remote work, telehealth and digital transformation.
David Gee, board risk adviser, non-executive director and author, shares leadership lessons from his career in his latest book, "The Aspiring CIO and CISO." He discusses his approach to managing cybersecurity risks, engaging with teams and simplifying communication.
The editorial team at Information Security Media Group interviewed 60 of the most well-known and influential leaders in the industry at RSA Conference 2024. Inside this 40-page CEO/Founder Compendium, you'll find insights on leadership, emerging trends in cybersecurity and the latest technologies.
Small and medium-sized businesses are vulnerable to cyberthreats, often due to insufficient investment in security measures. Joe Levy, CEO of Sophos, shares insights on enhancing SMB cybersecurity outcomes, with a focus on combating ransomware and protecting vital supply chains.
Successful cybersecurity requires integrating people, processes and technology. According to Tyler Zito, senior solutions architect at Expel, without well-defined processes and communication, even advanced technology and skilled personnel can't effectively secure the enterprise.
Check Point Software tapped the longtime leader of an Israeli cybersecurity incubator to be just the second CEO in the firewall behemoth's 32-year history. The company selected Team8 co-founder and Managing Partner Nadav Zafrir to replace Gil Shwed, who has led Check Point since inception in 1993.
Cybersecurity incidents are not just technical problems. They are also major public relations challenges. Effective IT and cybersecurity leadership during a crisis can significantly affect your company's reputation, stakeholder trust and overall recovery - and have a big impact on your career.
Kenneth Townsend, CISO of Ingredion Inc., shares strategies for managing cybersecurity in the manufacturing sector. He discusses the balance between flexibility and security and the need to understand business operations and leverage managed services for comprehensive protection.
To make cybersecurity a business enabler, cybersecurity teams need to focus on opening things up in a secure fashion so that the functionality and productivity of the business can flourish. Hearst's Andres Andreu discusses the areas in which this can be done.
According to Fortinet's latest Global Skills Gap Report, 90% of organizations experiencing a breach in the past year can partially attribute the incident to a lack of cyber skills. Fortinet's Rob Rashotte offers insight on the report and tips for tackling the skills shortage and minimizing enterprise risk.
Steve King served in senior leadership roles in technology development and deployment for the past 25 years. He worked as author, serial startup founder, CIO, CTO, CISO, CMO and - most recently - a passionate campaigner for cybersecurity education at ISMG. King died June 27, 2024, after an illness.
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense. Join us for a live demonstration of a new-school approach to Security Awareness Training and Simulated Phishing. Find out how 65,000+...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.