On this week's "Sound Off," attorney Lisa Sotto demonstrates how Colonial Pipeline did "a lot right" in its response to the DarkSide ransomware attack that led the firm to shut down operations for nearly a week last May. She shares best practices for enterprises to improve incident response plans.
CISO Allan Müller Buscarino possui uma riqueza de conhecimento por trabalhar em segurança da informação em bancos, finanças e startups. Ele discute como seus 15 anos de experiência o ajudam a enfrentar os desafios de gerenciar um programa de segurança para o gigante do comércio eletrônico Mercado Livre.
In this CyberEdBoard Expert Insights interview, Agnidipta Sarkar, group CISO of Biocon Group, says organizations and CISOs are still missing the boat when it comes to treating cybersecurity as a business issue, but leaders can learn to think differently to protect against today's cyber incidents.
In the latest weekly update, four ISMG editors discuss how ransomware attacks got worse in 2021, the backlash from privacy experts sparked by the IRS' decision - now changed - to use facial recognition technology on American taxpayers, and why cybersecurity fosters competitive advantage.
Data privacy is top of mind early this year, but it comes loaded with questions. Is it a CTO or CISO problem? Does securing data make it both beyond the reach of bad guys and hard to use for businesses? Manish Ahluwalia answers these and other key data privacy questions.
Things are not always what they seem, says incident response expert Joseph Carson, pointing to a case involving ransomware that infected a company in Ukraine, but for which there was no external attack path. Ultimately, his investigation found that ransomware had been used to hide internal fraud.
"All too often we hear that our industrial control systems have no security. That's not true," says Kevin Jones, group CISO of Airbus. In fact, he states, "some of these systems have been designed with security encapsulating them and security around them." He discusses enhancing cyber resilience.
On this week's "Sound Off," we ask John Kindervag, the founder of Zero Trust, for his reaction to the recently released Office of Management and Budget federal strategy to move the U.S. government toward a mature Zero Trust architecture.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including how the BlackMatter ransomware group has rebranded itself yet again, how the DOJ confiscated stolen Bitcoin worth more than $4 billion and takeaways from a U.S. Senate hearing on open-source...
As a veteran cybersecurity leader, Jerich Beason of Epiq has seen historic evolution in technology and how it is applied. But in cybersecurity leadership? The "softer side" of being a CISO has lagged behind, and this is where he intends to be an agent for positive change.
The modus operandi of fraudsters for synthetic ID fraud changed drastically between 2020 and 2021, says Al Pascual, senior vice president, data breach solutions at Sontiq, a TransUnion company. He discusses how the industry can collaborate better to reduce fraud.
As a CISO in financial services, Bradley Schaufenbuel of Paychex enjoys the velocity of change - no two days are alike. But with that pace comes a corresponding uptick in supply chain risk, which adds a new degree of difficulty to an already challenging leadership role.
Jameeka Green Aaron, CISO of Auth0, says, "We're not protecting technology; we are protecting people." Because of that, she is a strong proponent of "privacy by design" in security controls, and she strongly advocates for viewing fraud and privacy together - not separately.
As information security officer at MVB Financial Corp., Cara Coleman says the single biggest cybersecurity threat is just keeping up with the pace of attacks - and understanding the sophistication and trickery of the broad range of attackers. Here's how she tackles the challenge.
Four ISMG editors discuss important cybersecurity issues, including misconceptions around Zero Trust implementation, lessons learned from the crippling NotPetya malware attack of 2017 that nearly sank logistics giant Maersk and how a Russian cyberwar in Ukraine could move beyond its borders.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.