pritha's Posts (627)

Sort by

The Future of Secure Banking-Implementing Dynamic CVVs

๐—œ๐—บ๐—ฝ๐—น๐—ฒ๐—บ๐—ฒ๐—ป๐˜ ๐——๐˜†๐—ป๐—ฎ๐—บ๐—ถ๐—ฐ ๐—–๐—ฉ๐—ฉ๐˜€
๐˜ˆ๐˜ต๐˜ต๐˜ฆ๐˜ฏ๐˜ต๐˜ช๐˜ฐ๐˜ฏ ๐˜™๐˜‰๐˜: The Future of Secure Banking is Here โ€“

In todayโ€™s digital-first world, credit and debit card frauds pose significant challenges to both consumers and financial institutions. As card transactions grow, so do the risks of data breaches and financial scams. It's time for Indian banking regulators, especially the Reserve Bank of India (RBI), to explore cutting-edge measures that protect cardholders from these evolving threats.

One effective solution? Implementing Dynamic CVVs.

Unlike traditional static CVVs printed on the back of cards, dynamic CVVs change periodically, making them a moving target for fraudsters. This innovation can be a game-changer in the battle against card fraud and money laundering for several reasons:

๐—˜๐—ป๐—ต๐—ฎ๐—ป๐—ฐ๐—ฒ๐—ฑ ๐—ฆ๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜†: With a CVV that updates regularly, stolen card information becomes significantly harder to use. Even if criminals obtain card details, they won't be able to complete a transaction without the updated CVV.

๐—ฃ๐—ฟ๐—ผ๐˜๐—ฒ๐—ฐ๐˜๐—ถ๐—ผ๐—ป ๐—”๐—ด๐—ฎ๐—ถ๐—ป๐˜€๐˜ ๐—•๐—ฟ๐—ฒ๐—ฎ๐—ฐ๐—ต๐—ฒ๐˜€: High-profile data breaches expose millions of card details annually. Dynamic CVVs add an extra layer of protection, ensuring that stolen data is less valuable and much harder to exploit.

๐—ฃ๐—ฟ๐—ฒ๐˜ƒ๐—ฒ๐—ป๐˜ ๐— ๐—ผ๐—ป๐—ฒ๐˜† ๐—Ÿ๐—ฎ๐˜‚๐—ป๐—ฑ๐—ฒ๐—ฟ๐—ถ๐—ป๐—ด: The use of stolen credit card data in money laundering schemes is a growing concern. Dynamic CVVs could curtail this by adding a mechanism that disrupts unauthorized usage.

๐—œ๐—บ๐—ฝ๐—น๐—ฒ๐—บ๐—ฒ๐—ป๐˜๐—ฎ๐˜๐—ถ๐—ผ๐—ป ๐—•๐—น๐˜‚๐—ฒ๐—ฝ๐—ฟ๐—ถ๐—ป๐˜:
- Banking Partnerships: Collaborate with leading financial institutions to pilot dynamic CVV technology.
- Consumer Awareness Campaigns: Educate the public on how this change enhances their security.
- Regulatory Framework: Update compliance requirements to accommodate this security feature while ensuring consumer convenience.

Dynamic CVVs have ๐šŠฬฒ๐š•ฬฒ๐š›ฬฒ๐šŽฬฒ๐šŠฬฒ๐šฬฒ๐šขฬฒโ€€ฬฒ๐š‹ฬฒ๐šŽฬฒ๐šŽฬฒ๐š—ฬฒโ€€ฬฒ๐šŽฬฒ๐šกฬฒ๐š™ฬฒ๐š•ฬฒ๐š˜ฬฒ๐š›ฬฒ๐šŽฬฒ๐šฬฒ by some financial players globally, showing promising results in reducing fraud rates. Itโ€™s time for Indiaโ€™s banking sector to lead the charge and set new standards for payment security.

๐šƒฬฒ๐š‘ฬฒ๐šŽฬฒโ€€ฬฒ๐š‹ฬฒ๐š˜ฬฒ๐šฬฒ๐šฬฒ๐š˜ฬฒ๐š–ฬฒโ€€ฬฒ๐š•ฬฒ๐š’ฬฒ๐š—ฬฒ๐šŽฬฒ:ฬฒ By implementing dynamic CVVs, RBI can strengthen the trust and safety of Indiaโ€™s financial ecosystem, protecting millions of cardholders from potential fraud.

What do you think about this approach? Should RBI prioritize the adoption of dynamic CVVs? Letโ€™s discuss and push for a more secure digital payment future

ย 

-By Adv (Dr.) Prashant Mali

Original link of post is hereย 

Read moreโ€ฆ

Benefits of a Security Metrics Program

Why spend the time, money, and resources on a security metrics program anyway? This section will review theย Benefits of a Security Metrics Programย 

13111867865?profile=RESIZE_710x

A Lesson for Security Metrics from the Traffic Safety Industryย 

Starting and maintaining an security metrics program provides three main benefitsโ€” visibility, education, and improvement. These benefits can be derived from using metrics not only in the information security industry, but in any industry. Figure 1-5, an example from the traffic safety industry, illustrates the impact of metrics that can be used to help promote seatbelt usage, thereby saving lives.

In 1908, the affordability of Henry Ford's Model T opened car travel to middle-class Americans. That is the year in which automobiles became popular in the United States.

Country

Seatbelt usage

Traffic Fatality Rates

United States

75%

15 per 100,000

Great Britain

90%

6 per 100,000

Germany

90%

9 per 100,000

ย 

In his 1922 autobiography My Life and Work, Ford recalled saying the following about his game-changing vehicle:

โ€œI will build a car for the great multitude. It will be large enough for the family, but small enough for the individual to run and care for. It will be constructed of the best materials, by the best men to be hired, after the simplest designs that modern engineering can devise. But it will be so low in price that no man making a good salary will be unable to own oneโ€”and enjoy with his family the blessing of hours of pleasure in God's great open spaces.โ€

ย 

When cars first became popular, few people worried about automobile safety. Consumers were so excited about being able to travel and the dramatic improvements and changes it made in their lifestyles that safety concerns were an afterthought. In the late 1960s, a few experts recognized the safety issues and pushed for consumer awareness and government legislation. These efforts paid off. Over time, seatbelts have become so culturally embedded that, for most people, putting on a seatbelt is now practically a reflex. The use of metrics to encourage the use of seatbelts was key to achieving this objective, as described next.

Seatbelts originally were not intended as a means of providing safety in an emergency accident scenario. Rather, they were built into automobiles and airplanes for the purpose of keeping the passenger inside the vehicle. The automobile industry in the 1960s did not want to focus much attention on seatbelts because they did not want the public to fear driving. Traffic-related government funding was invested mostly in studying disposal of scrapped cars, and only a very small percentage was dedicated to highway safety.

ย 

-Abstract from โ€˜Security Metrics: A Beginnerโ€™s Guideโ€™ by Caroline Wong, CISSP

(Credits and Reference)

Read moreโ€ฆ

Announcing Nominations For 'Top 100 CISO Awards, 2024'

CISO Platform 100, 2024 (India):

Applications for the Top 100 CISO Awards is open for 2024. Kindly fill in your responses asap.

We are very happy to announce that nominations are now open for the 16thย Edition of Top 100 CISO Awards - India's 1st Security Recognition for CISOs. ย 

CISO Platform 100 has now grown into a global recognition with the names of inspiring influencers likeย Kevin Mitnick, Stefan Esser, Eugene Kaspersky, Bruce Schneierย ...... & more

>> Click Here To Nominate

ย 

ย 

Nomination Categoriesย 

  • CISO Platform 100ย - Individual Recognition for India's Top 100 IT Security Influencers
  • Categories for award include

ย 

ย 

How to nominate?

  • Deadline: 8 September, kindly fill your response asap

ย 

>> Click Here To Nominate

ย 

ย 

Vision/Spirit of Recognitionย 

  • Community Sharing:Our vision is to create tangible community goods by way of sharing our knowledge for the broader ecosystem
  • CISO Platform 100 Vision

    "Time 100"ย recognises the world's top influencers but there's nothing parallel for Security. So we createdย "CISO Platform 100"ย with the vision to recognise those who are making a difference to the world of security.ย 

ย 

Read moreโ€ฆ

In this insightful video, industry experts explore the transformative impact of Zero Trust on cybersecurity, discussing its role in addressing modern security challenges. As cyber threats evolve and traditional perimeter defenses become outdated, Zero Trust emerges as a crucial strategy for protecting networks and data. The discussion delves into the reasons why Zero Trust is essential, examines its implementation across different sectors, and highlights the key success factors for organizations adopting this approach. Join us as we navigate the complexities and opportunities of Zero Trust, along with insights from leading cybersecurity professionals.

ย 

ย 

Technical Executive Summary:ย 

  • Zero Trust as a Key Trend:

    • Zero Trust is identified as a significant shift in cybersecurity, moving from traditional perimeter defenses to identity-aware access control.
    • Workshops and discussions on Zero Trust have highlighted its growing influence in reshaping security frameworks.
  • Challenges in Current Security Models:

    • Current models often trust internal network interactions, which can allow access to malicious actors.
    • Zero Trust addresses challenges where neighbors within a network can't be trusted implicitly.
  • Zero Trust Implementation:

    • Trust should be transient and continuously evaluated rather than fixed.
    • Zero Trust emphasizes micro-segmentation and continuous authentication checks across users and devices.
  • Technological and Behavioral Integration:

    • Zero Trust requires holistic integration of various security technologies, including SD-WAN, secure web gateways, and advanced threat detection.
    • Successful implementation involves collaboration between IT and security teams and cultural shifts within organizations.
  • Critical Capabilities:

    • Integration of security technologies for real-time threat detection and response.
    • Use of machine learning and AI to dynamically assess and adapt to evolving threats.
  • Success Factors:

    • Prioritizing Zero Trust deployment based on business-critical areas.
    • Ensuring compliance is naturally achieved through robust security practices rather than just checking boxes.
  • Human and Cultural Aspects:

    • Building alliances within and outside the organization is crucial to overcoming challenges.
    • Continuous education, awareness, and stress management are essential components for maintaining effective security leadership.
Read moreโ€ฆ

In an insightful panel discussion hosted by the CISO platform, experts converged to delve into the technical challenges and strategies associated with implementing the Digital Personal Data Protection (DPDP) Act. Moderated by Rajiv Nandwani, Global Information Security Director at BCG, the session illuminated the intricate dynamics of aligning cybersecurity practices with the DPDP requirements.

The enactment of the DPDP Act has reshaped the horizon for CISOs, emphasizing a multifaceted approach that combines legal, governance, and technical expertise. Here's a detailed exploration of the technical insights shared during this comprehensive panel discussion:

ย 

ย 

ย 

Panel Members :ย 

  • Rajiv Nandwani, Global Information Security Director, BCG (moderator)
  • Dr. Prashant Mali, Lawyer practicing in Cyber, AI and Data Protection Law
  • Vijay Kumar Verma, Head Security Engineering, Reliance Jio
  • Dr. Jagannath Sahoo, CISO, Gujarat Fluorochemicals
  • Vijay Vasant Lele, Senior Technical Consultant, IBM Security
  • Pranay Manek, System Engineer Manager, Barracuda Networks
    ย 

ย 

Key Technical Insights :ย 

  1. Enhanced Data Classification and Discovery:

    • Data Mapping: Experts stressed the importance of robust data mapping processes. Effective data discovery is crucial to identify where sensitive personal data resides across both on-premise and cloud environments. Utilizing automated tools for continuous data inventory and classification was recommended to ensure that all data processing activities are accounted for.
    • Pseudonymization and Anonymization: Implementing techniques such as pseudonymization and anonymization were discussed as essential for safeguarding personally identifiable information (PII) during data processing and storage.
  2. Implementation of Security Controls and Risk Management:

    • Privacy by Design (PbD): Panelists highlighted the necessity of incorporating Privacy by Design and Privacy by Default from the outset of IT projects. This involves integrating privacy controls and data protection strategies throughout the design and development phases.
    • Vulnerability Management: Regular vulnerability assessments and penetration testing are critical to ensure system hardening. Employing real-time threat detection systems and Security Information and Event Management (SIEM) solutions were advised to proactively manage security threats.
  3. Cross-Border Data Transfer and Localization:

    • Data Localization Compliance: Discussions addressed the technical intricacies of complying with data localization laws. Organizations need to develop capabilities to store and process data within geographical boundaries as stipulated by local regulations.
    • Cross-Border Risk Mitigation: Establishing secure cross-border data transfer protocols and implementing data encryption both in transit and at rest are pivotal to maintaining compliance and mitigating associated risks.
  4. Consent Management and User Rights:

    • Advanced Consent Mechanisms: The DPDP Act requires explicit consent management mechanisms, necessitating sophisticated systems to manage, track, and document user consents effectively. Integration of user-friendly interfaces for consent withdrawal and preference management was suggested.
    • Data Subject Rights Automation: Automating processes to handle data subject requestsโ€”such as access, correction, deletion, and data portabilityโ€”helps in efficiently managing compliance with user rights.
  5. Incident Response and Breach Management:

    • Incident Response Planning: Implementing detailed incident response plans and maintaining readiness through regular drills and simulations was encouraged. These plans should integrate with legal processes to ensure timely reporting and compliance with the Act's stipulations.
    • Cyber Insurance and Risk Transfer: Enhancing cyber insurance policies to cover liabilities specifically associated with DPDP compliance exposures, including penalties and breach response costs, can provide financial protection and risk mitigation.

ย 

Conclusion:ย 

The panel concluded that addressing the technical demands of the DPDP Act requires a strategic blend of advanced cybersecurity frameworks, legal understanding, and executive oversight. CISOs are urged to be proactive, using the DPDP Act as a framework to reinforce data protection architectures and foster a culture of privacy awareness throughout the organization. By embracing these technological imperatives, organizations can transform compliance from a challenge into a competitive advantage, establishing robust trust with customers and stakeholders alike.

Read moreโ€ฆ

Fireside Chat On "The Future Of AI In Cybersecurity"ย 
With Bruce Schneier (Cyptographer, author & security guru) and Bikash Barai (Co-founder, CISOPlatform & FireCompass)ย 


>> Click Here To Read The Executive Summary.

Fireside Chat On "The Future Of AI In Cybersecurity"ย with Bruce Schneier and Bikash Barai

ย 

ย 

ย 

Featured Blogs To Read

giphy.gif?cid=28365d5eyascaznmw4w2iyfmmj27w822w6gujvp2smx0w56b&ep=v1_gifs_search&rid=giphy.gif&ct=g

ย 

Massive CrowdStrike IT Outage Has Global Implications for Cybersecurity

This blog explores the far-reaching effects of a significant IT outage at CrowdStrike, highlighting the impact on global cybersecurity operations and the lessons learned for improving resilience in the face of such disruptions.
Read More

ย 

ย 

66a0c8787ae754f94c3335cc.jpeg

ย 

Building a Privacy-Driven Culture: Key Steps for Organizational Success

This blog outlines essential strategies for fostering a culture of privacy within organizations, emphasizing the importance of leadership, training, and transparent communication in safeguarding personal data.
Read Moreย 

ย 

ย 

censorship-limitations-freedom-of-expression-restricted-39584.jpeg?auto=compress&cs=tinysrgb&dpr=2&h=650&w=940

ย 

[Free Book] Zero Trust CNAPP - Definitive Guide

A comprehensive overview of key concepts and technical details of Zero Trust CNAPP (Cloud Native Application Protection Platform). The book is compiled by cloud security practitioners who specialize in the design, architecture, engineering, development, and deployment of Cloud Security solutions. We believe you will find this to be a very informative guide in your journey to implement Zero Trust Cloud Security solutions.
Get Accessย 

ย 

ย 


ยญ
Upcoming Webinars & Events

If you are interested register for the upcoming meets

  • Gen AI Task Forceย - 25 July, Online (any location can join) :ย Register Hereย 
  • Annual CISO & Founders Breakfast at BlackHat 2024ย - 8 August, Las Vegas :ย Register Hereย 
  • Top 100 Awards, 2024 .. ย Nominations open!ย :ย Nominate Nowย 

ย 

ย 

Read moreโ€ฆ

CISO Breakfast at BlackHat Las Vegas 2024!

ย 
667bfbb04e24b7c0d700090b.png

Invitation: CISO Breakfast at BlackHat, Las Vegas 2024!ย 

Hello,

We are thrilled to invite you to the Annual CISO Breakfast at BlackHat 2024.ย 

CISOPlatform is a community partner for the event which is co-hosted by Silicon Valley Bank, Stage One, First Rays Venture Partners, Latham & Watkins.


ย 

Event Details :ย 

  • Date: Thursday, August 8th, 2024
  • Time: 9:00 AM โ€“ 11:30 AM PST
  • Venue: Lago by Chef Julian, Bellagio Hotel, 3600 Las Vegas Blvd S, Las Vegas, NV 89109


ย 

Agenda :ย 

  • Gourmet breakfast by Chef Julian
  • Exclusive networking with industry leaders
  • Discussion on Gen AI cybersecurity taskforce formation & milestones along with Bikash Barai, Co-founder CISO Platform

ย 


See you there ! Click here to register

ย 

Click Here To Register (RSVP)
ย 
Read moreโ€ฆ

In the fast-paced world of cybersecurity, the role of a Chief Information Security Officer (CISO) is akin to that of a guardian of the digital realm. However, behind the scenes, this position often comes with an overwhelming burden that can lead to burnout and stress. How can CISOs effectively navigate these challenges and find balance in their professional and personal lives?

At CISOPlatform, the worldโ€™s premier online community for senior security executives, we recognize the pressing need to address CISO burnout head-on. That's why we're excited to invite you to our upcoming roundtable discussion, in partnership with FireCompass, titled "CISO Burnout & Stress Management: Addressing Through Mindfulness."

ย 
>>> Click here to Join the Round Table

Keypoints Of Discussion :

  • Can organizational culture impact and solve this problem?
  • Why are we expected to be 'always on' .. can organization culture fix it?
  • How can cyber maturity be best set to make a CISO worry-free?ย 
  • Should companies be committed financially to a time-off/networking event? How much has this changed in recent times?ย 
  • CISOs are overstretched (over-stressed hours per week, missing holidays etc)
  • The staffing shortage and skill gap make it harder
  • The ever-increasing threat and solution landscape make it harder to keep up and evolve infrastructure accordingly
  • Crucial areas of impact - tenure of CISO, lower engagement with other executives, less capacity to drive team. Crucial areas like hiring, customer communication, and professional development get hindered and ignored

ย 

Join Us:

Date & Time:

On 9th May 2024, Thursday 8:00 AM (PDT) @San Francisco

On 14th May 2024, Tuesday 8:00 AM (PDT) @Reston

On 15th May 2024, Wednesday 08:00 AM (PDT) @Philadelphia

Let's tackle CISO burnout head-on, together! Register now to secure your spot:ย https://www.cisoplatform.com/ciso-burnout-stress-management-roundtable

Read moreโ€ฆ

Meet CISO Platform At RSA Conference 2024

Meet CISO Platform At RSA Conference 2024 (Register Here)

CISOPlatform is a global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

ย 

CISOPlatform Breakfast Meetup @RSAC 2024 in Association with FireCompass

Topic: CISO Burnout & Stress Management: Addressing Through Mindfulness

12429339061?profile=RESIZE_400x

Venue, Date & Time: St. Regis Marriott, SFO, 9th May, 2024, Thursday at 8 AM

Join CISOPlatform for a breakfast meetup, where cybersecurity leaders gather to discuss the problem of CISO burnout. A big thank you to FireCompass, a partner in this community meetup.

  • Can mindfulness impact and solve this problem ? How do you practice mindfulness when you are expected to be "always ON"?
  • Register Nowย limited seats and a prior confirmation is required *

ย 

ย 



CISOPlatform Meet US @RSAC Press Room For An Exclusive Interview

RSAC%202024%20(RoundTable).png?profile=RESIZE_400x

Venue, Date & Time: RSA Conference, Moscone Center, SFO, Press Room, 6th to 9th May, 2024

Join us in the press room at the RSA Conference, where we'll conduct exclusive interviews with CISO's.ย  Here is your opportunity to share your insights with 50,000+ subscribers at CISO Platform. Let's make waves together in the world of cybersecurity!

Register Nowย limited seats and a prior confirmation is required *

ย 

Read moreโ€ฆ

CISOPlatform Summit: Stronger Together As A Community
Join us on 30th May, Thursday, Shangri-La at Bangalore
CISOPlatform Summit is Asia's largest IT security conference with focus on helping the community through collaboration, making better security buying decisions and overall helping them succeed in their roles. CISOPlatform is an online social network exclusively for IT Security Professionals with 6,500+ Global CISOs and 40,000+ subscribers. Our goal is to provide highest quality information to CISOs to help them excel in their role. This conference will bring together the security community's top minds in the industry together to learn on 'benchmarking security', 'prioritising security investments', 'evaluating security products', 'task force initiatives', 'emerging fields in security & trends' & more.

ย 

Program Committee & Task Force Membersย 

  • Rajiv Nandwani - Director, BCG
  • Nabankur Sen - Advisor, HSBC
  • Rajesh Thapar - CISO, Axis Bank
  • Sudarshan Singh - VP Group Cybersecurity Leader, Capgemini
  • Ambarish Singh - CISO,ย Godrej & Boyce Manufacturing Company
  • Vijay Kumar Verma -ย SVP and Head Cyber Security Engineering,ย Jio Platforms
  • Gowdhaman Jothilingam -ย Global CISO & Head IT,ย LatentView Analytics
  • Manoj Kuruvanthody -ย CISO & DPO,ย Tredence
  • Aditi Lath -ย Senior CyberSecurity Assurance Analyst,ย Emirates
  • Parag Kamra -ย  AVP, Axis Bank
  • Pradnya Manwar -ย Senior Director, Information & Cyber Security, Sutherland
  • Suprakash Guha -ย CISO, General Manager Corporate Quality,ย Lumina Datamatics
  • Bikash Barai -ย Co-Founder,ย CISO Platform; Co-Founder & CEO, FireCompass
  • Deval Mazmudar -ย Cybersecurity Advisor,ย TJSB Bank
  • Priyanka Aash -ย Co-Founder,ย CISO Platform

ย 

>>More details : click here

ย 

Read moreโ€ฆ

Announcing 'Call For Speakers' @SACON + AICON 2024

I am highly excited to tell you the most exciting event and all the buzz of CISOPlatform Summit is back !
Further more I am more excited because now is the time when we will receive your innovation, those billions of papers and the most exciting hacks of this year.

Below I will share a few details that could help you submit your papers-

Step 1 - Choose Your Speaking Slot

We believe in sharing knowledge which is short, great and impactful. We don't believe in restricting oneself from thoughts and sharing them, thus your talk will win the speaking slot most apt to your needs.

  • "Best of the World" Keynote .. This series shall invite the top speakers and security researchers across the world who made significant contribution in the field of security in recent past.ย 
  • TED Style Talk (15 Minutes) .. This session aims at sharing knowledge inย 15 minutesย including new Insights and live Demos
  • Real Life Case Study (15 Minutes) .. This series encourages the Top CISOs to speak on how they implemented their most successful projects. Learning from their practical hands on insights is targeted.
  • CISO Tools/ Framework (15 Minutes) .. Here tools/frameworks are presented to help a CISO in better and structured decision making
  • Deep Dive (30 Minute) .. These sessions are workshop styled with hacking demos or short labs
  • Technical Trainings (1Day or 2 Day) .. If you're a security trainer, this would be a place to present your training. Profit sharing is discussed separately.ย 

>> Apply For Call For Speakers (15-30 Minutes Talks)ย 

>> Apply For Call For Trainers (1 or 2 Day Technical Workshops)ย 

ย 

ย 

Step 2 - Choose The Domain Of Your Talk

You are the best judge of which domain you are most proficient, where you have new learning, which area you are confident about. One great way to decide between multiple options can be to choose a domain you love to listen to talks or even one that can be most helpful for information security officers.

  • Technology
  1. Artificial Intelligence
  2. Secure Coding
  3. API Security
  4. Cloud Security (AWS, Azure..)
  5. Application Security/ Pentesting
  6. Security Operations Centre(SOC)
  7. Privacy
  8. Incident Response
  9. Security Architecture
  10. Threat Hunting
  11. IoT Security
  12. Cyber Forensics
  13. SecDevOps

ย 

  • Security Management
  1. Security Tech Landscape
  2. CISO Board PPT/ Metrics/ Tools/ Security Posture
  3. Cost Control
  4. Risk Management
  5. Vendor Management
  6. Governance Risk and Compliance
  7. Managing the CEO/CIO/Board expectations
  8. Reference Architecture, Check lists and Decision Frameworks

ย 

  • Personal Development
  1. Leadership
  2. Career Growth
  3. Entrepreneurship
  4. Stress Management
  5. Personal Effectiveness
  6. Work-Life Balance/Happiness

ย 

ย 

Step 4 - Create An Awesome Topic

For this, previous year topics can always be very helpful in understanding both your best area of communication and the audience expectations. Here are a few-

  • Most Recent Attack Vectors Which a CISO Must Know
  • Analysis of Hackers Landscape in Asia and Middle - East
  • Analytics Driven Security
  • ERP Security: Attack Vectors and Defense
  • Lessons Learnt from the Anti-Terrorist Squad of India
  • Securing Mobile Banking
  • Global Best Practices to Defend Against Targeted Attacks
  • Latest Attacks Vectors and Threats on Aircrafts and Unmanned Arial Vehicles
  • Attacks on Smart TVs and Connected Smart Devices
  • Hunting Botnets: Detecting Indicators of Compromise

ย 

Step 5 - Create Your Session Abstract

Your paper is always awesome, no doubt on that. However it's always handy to know what is expected to maximize the success. Our Review Board will consist of highly experienced information security experts from all over the world.ย They just love geeky security and innovative technology. So, quickly write down your papers and send it to us.

Quick Tips On Content Selection -

  • Short and Preciseย .. The best communication is the sentence which is unambiguous, short and impactful. We look for similar content which
    appeal to human senses and is easy to understand.
  • Out Of The Boxย .. Content has no end. Yet the edge above is thought by very few. We like to encourage human nature of innovation, creativity
    and discovery. Such is why we are Humans not Apes!
  • Helpfulย .. Mostly sharing knowledge has a common goal of helping the infosec peers. We encourage your ideas that help the security community
    in solving a problem.
  • Trendingย .. Even though trending topics get the maximum competition, they also get a few more slots. These topics equip a CISO with current technologies and vulnerabilities. They are a few favorites to our audience.
  • Experienceย .. Time has been by far the best teacher. No one denies that. So, your experience can count a lot. Tell us the experience that is
    unique to you and also awesome. Our CISOs would lend an eager ear to that.
  • Technical Detailsย .. It is highly probable your audience has the fundamentals or basics of a subject grasped. We therefore advice you to deliver your speech at an advanced level where it can be most appropriate for information security officers. For example, if you are talking about
    Denial-Of-Service, you may assume your audience understands the difference between DOS and DDOS and also understands most popular software mechanisms available. Our security conference cherishes more detail from its Speakers.

ย 

Step 6 - You Did It, Sit back and Relax

Great, You're done! Our review board will review the content and get back to you via mail.ย 

P.S. - We are unable to alot speaking slot to everyone right now. We hope it's possible in future. For now our review board selects the speakers as mentioned above. ย 

ย 

Step 7 - Declined? Ask Why

Incase we could not accept your paper this year, we are very sorry for that. However, you must know 'Why?' . Please mail us at contact@cisoplatform.com to know what went wrong. There is no reason why you should be disheartened, it is the constraints of time that bind us. We might take sometime to revert back but we will definitely do. Start afresh, keep amendments in mind and submit your proposal the year after-because most speakers get accepted eventually and we'd hate to miss you.

ย 

Step 7 - Accepted? Know Our Speaker Benefits

CISO Platform is proud to have you with us. Your comfort is our sole responsibility , your contributions will be well rewarded.ย 

  • Complimentary Pass ..ย Complimentary pass to speakers
  • Address great audienceย .. Address the largest gathering of senior security executives
  • Grow your networkย .. Make your networking many folds in a day @Annual Summit
  • Showcase your profileย .. Your Profile will be showcased on our website and who doesn't know the worth of 'Ted Talkers' today?

For any queries mail to contact@cisoplatform.com

ย 

ย 

Important Dates & Links

Keep forgetting? Great, the good news is it's absolutely normal and the other is there's a Google Calendar/Mobile Reminders. We hate to give dates, it's just the billions of exciting paper need to be reviewed way before the event. Please fill in your nominations prior to last date as post that no submissions will be accepted.

You can submit proposals by filling up the Call for Papers here:ย 

Call for Papers opens: 09th Feb, 2024

Call for Papers closes: 23rd Feb, 2024

>> Apply For Call For Speakers (15-30 Minutes Talks)ย 

>> Apply For Call For Trainers (1 or 2 Day Technical Workshops)ย 

ย 

*We strongly suggest that you submit your papers early as the window will close early if sufficient quality papers have been received.

Read moreโ€ฆ

Introduction: Understanding the SolarWinds Breach and Its Fallout

The SolarWinds breach marked a turning point in the way cybersecurity is perceived and managed. As organizations grapple with the aftermath, it becomes imperative for CISOs, CIOs, and cybersecurity professionals to comprehend the legal ramifications and the challenges that lie ahead.

ย 

Meet The Experts

Matthew Rosenquistย (moderator)ย With a staggering 35 years in the cybersecurity industry, Matthew Rosenquist brings a wealth of experience to the table. Not just a CISO, he is a cybersecurity strategist and industry adviser. His spirited moderation guides us through the legal intricacies of the SolarWinds saga.

Jim Routhย (speaker)ย isย the Chief Trust Officer at Saviant, stands out as a luminary with over 22 years in cybersecurity leadership. Having served as CISO and board member for giants like JP Morgan Chase and KPMG, his insights promise to dissect the legal implications of the SolarWinds breach.

Michael W. Reeseย (speaker)ย isย the frontline CISO of Charge EPC, brings a unique perspective with 17 years in cybersecurity. His experience as a director, CISO, and adjunct professor offers valuable insights into how legal ramifications impact the daily battles of securing organizations.

ย 

Part 1 Recap

Before we delve into the discussion, it's worth noting that this article is Part 2 of the conversation. Part 1 revolved around the subject of SolarWinds Breach: Legal Insights and CISO Ramifications Unveiled by Cybersecurity Experts. If you missed it, you can catch up here: https://www.cisoplatform.com/profiles/blogs/part1-solarwinds-breach-legal-insights-and-ciso-ramifications

ย 

Changing Corporate Policies and CISO Empowerment

The panelists discuss the precedent set by the SolarWinds breach and its potential to drive fundamental changes in corporate policies. Highlighting the deeply ingrained nature of cybersecurity policies, the conversation addresses the empowerment of CISOs and their role in driving communications to regulatory bodies such as the SEC.

ย 

Examining the Legal Landscape: Form 8K Filings and Executive Accountability

An in-depth analysis of the legal landscape post-SolarWinds breach includes a scrutiny of Form 8K filings. The discussion raises questions about executive accountability, emphasizing the importance of transparent and honest reporting to regulatory agencies. The complexity of assigning blame and potential legal consequences are explored.

ย 

CISO Accountability: Balancing Responsibility and Collaboration

The panelists engage in a nuanced conversation about CISO accountability. While recognizing the CISO as a crucial figure in reporting cybersecurity incidents, they discuss the delicate balance between the technical content of disclosures and collaboration with legal and executive teams.

ย 

Reflections on the SEC's Enforcement Action: Impact on the Cybersecurity Industry

Delving into the SEC's enforcement action against SolarWinds and its potential consequences, the panelists express concerns about the broader impact on the cybersecurity industry. The discussion emphasizes the importance of cooperation and collaboration between regulatory agencies and the private sector for enhanced cybersecurity resilience.

ย 

Looking Ahead: Lessons Learned and Recommendations for CISOs

As the industry grapples with the fallout from SolarWinds, the panelists share insights on lessons learned and provide valuable recommendations for CISOs. The evolving role of CISOs, the need for robust identity access management, and proactive steps to strengthen cybersecurity defenses are explored.

ย 

Conclusion: Navigating the New Normal in Cybersecurity

The SolarWinds breach has undoubtedly reshaped the cybersecurity landscape. Through the lens of the insightful CISO provide a comprehensive understanding of the legal implications and CISO ramifications. As the industry adapts to these challenges, collaboration, transparency, and continuous learning emerge as the cornerstones of effective cybersecurity management.

ย 

>>Join the Cybersecurity Conversation: For deeper insights and to be part of the ongoing cybersecurity discourse, join CISO Platform - the cybersecurity community. Sign up here.

ย 

Read moreโ€ฆ

Introduction:

In a recent CISO Panel Discussion, cybersecurity heavyweights Matthew Rosenquist, Jim Routh, and Michael W. Reese delved into the intricacies of the SolarWinds Breach, unraveling its legal implications and the far-reaching ramifications for Chief Information Security Officers (CISOs). Let's dissect their insights, bridging the gap between the legal landscape and the practicalities faced by those safeguarding our digital realms.

ย 

About Speaker

Matthew Rosenquistย (moderator)ย With a staggering 35 years in the cybersecurity industry, Matthew Rosenquist brings a wealth of experience to the table. Not just a CISO, he is a cybersecurity strategist and industry adviser. His spirited moderation guides us through the legal intricacies of the SolarWinds saga.

Jim Routhย (speaker)ย isย the Chief Trust Officer at Saviant, stands out as a luminary with over 22 years in cybersecurity leadership. Having served as CISO and board member for giants like JP Morgan Chase and KPMG, his insights promise to dissect the legal implications of the SolarWinds breach.

Michael W. Reeseย (speaker)ย isย the frontline CISO of Charge EPC, brings a unique perspective with 17 years in cybersecurity. His experience as a director, CISO, and adjunct professor offers valuable insights into how legal ramifications impact the daily battles of securing organizations.

ย 

Why the Buzz? Unraveling the Heated Debate:

The SolarWinds case has ignited passionate debates among CISOs, creating two distinct camps within the cybersecurity community. On one side, professionals perceive SEC actions as an undue burden on CISOs, unfairly targeting them as scapegoats. On the flip side, proponents argue that the case addresses individuals breaking the rules and being held accountable, emphasizing it doesn't impose specific security controls on public companies.

ย 

Setting the Stage: Understanding the SEC and Its Mission:

Before diving into the discourse, let's establish a foundational understanding of the SEC. As an independent federal administrative agency, the SEC's mission revolves around protecting investors and ensuring fair market practices. Their role, especially in cases like the SolarWinds Breach, is to maintain the integrity of financial markets by preventing unfair market manipulations.

ย 

Navigating the Legal Landscape: The SEC Complaint:

The discussion revolves around the 68-page SEC complaint, accessible on their website. It meticulously outlines various claims, with a particular focus on fraud. For a formal definition of fraud, Section 532 of the penal code is the go-to resource, shedding light on fraudulent activities related to official company filings.

A crucial point to emphasize here is the cornerstone principle of our justice system: the presumption of innocence until proven guilty. The burden of proof lies with the SEC prosecution, and it's essential to approach the accusations with this in mind.

ย 

Precedent-Setting Event: The Ripple Effect on the CISO Community:

Jim Routh, drawing from his extensive experience, highlights the unprecedented nature of this case. SEC actions against an individual CISO, Tim Brown of SolarWinds, set a precedent that reverberates throughout the industry. The repercussions are far-reaching, potentially dissuading talented cybersecurity professionals from taking up CISO roles due to increased personal liability concerns.

ย 

CISO Dilemma: Balancing Judgment and Accountability:

Jim delves into the two dimensions of the SEC complaint: timing and content of the notification. Corporate policies typically dictate that legal departments handle regulator notifications, introducing a layer of oversight. However, the SolarWinds case spotlights the CISO as the individual bearing accountability for these decisions, even in contradiction to established corporate protocols.

ย 

Speaker Perspective: The Seat at the Table Comes with Accountability:

Michael emphasizes a paradigm shift in the CISO community. The coveted "seat at the table" now entails heightened accountability, especially when cesos may not be covered by indemnification policies. This case serves as a stark reminder that the CISO role carries personal liability, necessitating a meticulous approach to governance, risk, and compliance.

ย 

The Impact on CISO Decision-Making: Pros and Cons:

As the panelists dissect the SEC filing, the potential consequences become evident. The case prompts a reevaluation of security questionnaires and practices, urging CISOs to move beyond mere checkbox exercises. The implications go beyond guilt or innocence, shaping the cybersecurity landscape in terms of tools, behavioral changes, and industry maturity.

ย 

Conclusion: Navigating the Changing Tides of Cybersecurity Accountability:

In the aftermath of the SolarWinds Breach, CISOs find themselves at a crossroads. The industry is witnessing a paradigm shift, with legal actions reshaping the expectations and accountability of those at the helm of cybersecurity. As the debate rages on, one thing is clear: the need for a proactive and informed approach to cybersecurity governance.

ย 

>>Join the Cybersecurity Conversation: For deeper insights and to be part of the ongoing cybersecurity discourse, join CISO Platform - the cybersecurity community. Sign up here.

ย 

Read moreโ€ฆ

Introduction

Welcome to a riveting discussion with cybersecurity maestros Dan Lohrmann, Danielle Cox, and Michael Gregg, who unravel the hottest trends shaping the cyber landscape for State Chief Information Security Officers (CISOs) in 2023. As we delve into their insights, get ready to chart a course for the future of cybersecurity that aligns with the ever-evolving digital terrain.

ย 

Meet the Experts

Dan Lohrmannย - Field CISO, Presidio
With a background spanning from the National Security Agency to Michigan Government, Dan brings extensive experience to the table. His journey has been marked by various roles in both state and federal government, providing a unique perspective on the challenges and successes of CISOs.

Danielle Coxย - CISO, West Virginia
Danielle's remarkable journey from a legal background to cybersecurity leadership showcases her adaptability and commitment to the field. As the CISO of West Virginia, she oversees the cybersecurity efforts for the state, bridging the gap between the public and private sectors.

Michael Greggย - CISO, North Dakota
Michael's pivot from the private sector to state government was driven by a desire to enhance the efficiency of state operations. He's responsible for safeguarding a broad spectrum of government entities in North Dakota.

ย 

Part 1 Recap

Before we delve into the insights, it's worth noting that this article is Part 2 of the conversation. Part 1 revolved around the subject of What's Hot For State CISOs In 2023. If you missed it, you can catch up here - https://www.cisoplatform.com/profiles/blogs/part1-usa-panel-what-s-hot-for-state-ciso-in-2023-by-dan-lohrmann

ย 

1. Navigating the Tech Wave: Automation Takes Center Stage
In a world brimming with possibilities, automation emerges as the unsung hero. Michael Gregg, CISO of North Dakota, reveals how automation is key to handling the colossal task of protecting extensive environments. With a whopping 250,000 endpoints to secure, the manual approach becomes impractical. Join us as we explore the pivotal role of automation in fortifying state-level cybersecurity.

ย 

2. AI: A Double-Edged Sword
Danielle Cox, CISO of West Virginia, sheds light on the excitement surrounding Artificial Intelligence (AI) in cybersecurity. From empowering automation to enhancing threat hunting capabilities, AI holds immense promise. However, Danielle doesn't shy away from addressing the challengesโ€”misinformation, data privacy concerns, and the delicate balance between innovation and security. Discover how West Virginia is tackling these hurdles head-on.

ย 

3. The Tool Dilemma: Balancing Act for CISOs
The toolbox is overflowing, and every vendor claims to have the ultimate solution. But as Dan Lohrmann, Field CISO at Presidio, points out, more isn't always better. With an abundance of tools, CISOs face the challenge of selection and integration. The allure of free trials and approvals masks the hidden costโ€”time. Join the discussion on finding the delicate equilibrium between innovation, security, and resource optimization.

ย 

4. Generative AI and its Implications for State Governments
The advent of Generative AI brings both promise and caution. Danielle Cox delves into West Virginia's exploration of AI technologies, particularly in election information. However, she emphasizes the need to guard against bias and ensure unbiased results for citizens. Join us as we explore the potential and pitfalls of Generative AI in the public sector.

ย 

5. State-Level Cybersecurity Plans: West Virginia and North Dakota Perspectives
Both West Virginia and North Dakota have cybersecurity plans, tailored to address the unique challenges of their states. Danielle Cox and Michael Gregg unveil their top priorities, from vulnerability remediation to incident management. Gain insights into their strategic approaches that can inspire your organization's cybersecurity roadmap.

ย 

6. Remote Work Realities: Striking the Balance
The global shift towards remote work brings a mix of opportunities and challenges. Michael Gregg advocates for a hybrid model, valuing personal interactions alongside remote efficiency. Meanwhile, Danielle Cox shares West Virginia's predominantly remote setup and its impact on hiring in a competitive job market. Discover how these CISOs are adapting to the changing dynamics of the workplace.

ย 

Join the Cybersecurity Revolution with CISO Platform

Elevate your knowledge, network with industry leaders, and stay ahead of the curve by becoming a part of CISO Platform. Take the first step towards securing your organization's future by signing up here.

ย 

Read moreโ€ฆ

We had Chennai Task Force session on "Digital Personal Data Protection (DPDP): Practical approach for CISOs" byย Our community members.ย The bill aims to protect individual data and regulate data practices. CISOs should be aware of the new requirements to avoid penalties.ย 

ย 

About Speakersย 

-(Moderator) Gowdhaman Jothilingam, Globalย CISO, LatentView Analytics

-Prabhakar Ramakrishnan (CISO, TNQ Publishing). Prabhakar is a seasoned IT professional with over 25 years of experience in the field of IT Infrastructure and Information Security. He currently serves as the CISO & General Manager - IT Infrastructure at TNQ Technologies.

-Dr. Jagannath Sahoo (CISO, Gujarat fluorochemicals). Jagannathย have had the privilege of leading and enhancing the cybersecurity posture of INOX GFL, headquartered in Noida, India, Gujarat Fluorochemicals Limited (GFL), is a part of the INOXGFL Group.

ย 

Key Discussion Pointers:ย 

1. Introduction to Data Privacy
- What is data privacy
- Privacy laws around the globe
- DPDPA Journey

2. Understanding the New Indian DPDPA 2023
- Objectives
- Principles of DPDPA
- Applicability
- Rights & Duties of Individuals
- Principals
- Legal implications/penalties

3. A practical approach to DPDPA compliance
- Personal data Inventory
- DPIA
- Risk treatment

ย 

(Webinar Recorded) :ย 

ย 

ย 

ย 

(PPT) Presentation From The Discussion

ย 

Downloads from the session :ย 

ย 

ย 

Highlights From The Discussion :ย 

1.ย What are the 3 types of privacy?

  • Physical privacy (for instance, being frisked at airport security or giving a bodily sample for medical reasons)
  • Surveillance (where your identity can't be proved or information isn't recorded)
  • Information privacy (how your personal information is handled)

ย 

2. What is data privacy?

  • Data Privacy: Compliance with Data protection laws and regulations. Focus on how to collect, process, share, archive and delete the data
  • Data Security: Measures that an organisation is taking in order to prevent any third party from unauthorized access

ย 

3. What does Personal Data mean?

ย According to the personal data protection bill, 'Personal data' refers to information, characteristics, traits or attributes that can be used to identify an individual. This includes:

  • Financial data
  • Biometric data
  • Data about caste, religious or political beliefs
  • Any other category of data specified as personal by the government

ย 

4. Data Protection and Privacy Acts World Wide

12308955063?profile=RESIZE_710x

ย 

5. Rights of Individuals under the Digital Personal Data Protection Act 2023. The DPDP Act proposes the rights to individuals, which ensures that their personal data is processed with their consent and there are measures available to safeguard their data.

  • Right to Information about Personal data
  • Right to correction, completion, Updation and erasure of personal data
  • Right of Grievance redressal
  • Right to nominate

ย 

6. Structure of DPDPA Act 2023

12308961471?profile=RESIZE_710x

ย 

7.ย Applicability of the Bill

The Bill is intended to apply to processing of personal data within the territory of India by Indian data fiduciaries and data processors.ย Further, the Draft Bill is also intended to apply to foreign data fiduciaries and data processors, where personal data is processed by them in connection with:

  • Any business carried on in India; or
  • For systematic activity of offering goods or services to data principals within the territory of India; or
  • Any activity which involves profiling of data principals within India

ย 

8. Compliance & Best Practices
- 8 Steps to DPDP Act Compliance

  • Appoint a DPO
  • Create a Privacy Management Program
  • Conduct a Privacy Impact Assessment
  • Implement Data Protection Policies and Procedures
  • Train Employees and Partners
  • Monitor and Review Compliance
  • Respond to Data Subject Requests
  • Report Data Breaches

- 5 Best Practices for Data Protection

  • Practice Data Minimization
  • Securely Dispose of Data
  • Encrypt Sensitive Data
  • Implement Access Controls
  • Regularly update security measures

ย 

9. What you can do to prepare for the Digital Personal Data Protection Bill 2023

  • Conduct a data audit
  • Implemement strong data governance
  • Enhance data security measures
  • Conduct Employee training
  • Develop data subject rights procedures
  • Review and update policies
  • Obtain valid consent
  • Develop data breach response plan
  • Establish vendor managementย 
  • Stay updated and seek legal advice

ย 

10.ย DATAPRIVACY:1-Pager self-audit checklistย 

12308970670?profile=RESIZE_710x

ย 

ย 

Read moreโ€ฆ

In the fast-evolving landscape of cybersecurity, staying informed about recent breaches and understanding their legal implications is crucial for security professionals. In this blog post, we delve into the SolarWinds breach, examining the legal facets and the potential ramifications for Chief Information Security Officers (CISOs) and their organizations.

ย 

Panelists

Matthew Rosenquist (moderator)ย With a staggering 35 years in the cybersecurity industry, Matthew Rosenquist brings a wealth of experience to the table. Not just a CISO, he is a cybersecurity strategist and industry adviser. His spirited moderation guides us through the legal intricacies of the SolarWinds saga.

Jim Routh (speaker)ย isย the Chief Trust Officer at Saviant, stands out as a luminary with over 22 years in cybersecurity leadership. Having served as CISO and board member for giants like JP Morgan Chase and KPMG, his insights promise to dissect the legal implications of the SolarWinds breach.

Michael W. Reese (speaker)ย isย the frontline CISO of Charge EPC, brings a unique perspective with 17 years in cybersecurity. His experience as a director, CISO, and adjunct professor offers valuable insights into how legal ramifications impact the daily battles of securing organizations.

We would like to thank our speakers and community Partner FireCompassย for supporting the webinar. FireCompass is recognized as a leader by Gartner in Continuous Pen Testing, Red Teaming and Attack Surface Management. FireCompass is trusted by Top 10 Telcos, Fortune 500 companies and also mid market companies.

ย 

Panel (Recorded)

ย 

The discussion begins with a closer look at the charges filed against SolarWinds. Each speaker offers unique perspectives on what the SEC complaint entails. There's a focus on the legal requirements for public companies, emphasizing the SEC forms (S1, S8, 8K) and the obligation to provide accurate and timely information to investors. The nuances of how the SEC perceives intentional deception by the company and the CISO are explored, setting the stage for a comprehensive understanding of the legal intricacies.

ย 

Corporate Policies vs. SEC Guidelines: A Delicate Balancing Act

Jim Routh adds valuable insights by highlighting the corporate policies that often dictate the process of notifying regulators. The conversation navigates through the role of legal departments and the responsibilities they bear in the face of security incidents. The delicate balance between corporate policies and SEC guidelines is scrutinized, raising questions about who holds ultimate responsibility for the accuracy and legitimacy of the content in regulatory filings.

ย 

The Unraveling Precedent: Implications for the Industry

The panelists express concerns about the precedent set by the SEC in this case. They argue that the enforcement action might have broader consequences for the industry, potentially hindering the timely sharing of sensitive information with regulators. The discussion emphasizes the need for a cooperative approach between regulatory agencies and private enterprises to bolster cybersecurity resilience.

ย ย 

Understanding the Landscape

The Ever-Expanding Terrain:

Since the onset of the COVID-19 pandemic, the cybersecurity landscape has stretched beyond the confines of corporate walls, reaching into the homes of employees. This expanded terrain presents a new challenge โ€“ managing and securing a vast environment. The trio emphasizes the need for a comprehensive understanding of every asset, both inside and outside the traditional corporate infrastructure.

The Shift in Mental Paradigm:

Matthew Rosenquist emphasizes the mental shift required for CISOs. The game has changed, demanding meticulous documentation and transparency. In an era where hiding vulnerabilities is no longer an option, honesty, collaboration, and accountability become paramount.

ย 

Legal Implications and CISO Ramifications

Documenting Roles and Responsibilities:

One key takeaway is the importance of clearly documenting the roles and responsibilities of a CISO. This includes defining the extent of their authority, ensuring transparent approval processes, and facilitating seamless communication with upper management, the C-suite, and investors.

Navigating the Legal Landscape:

Jim Routh highlights the weaknesses in identity access management practices within a DevOps process, especially in the context of a cloud-first model. He stresses the necessity for enhanced controls tailored to the nuances of a cloud-based software supply chain.

Negotiating for Personal Protection:

In response to the evolving landscape, Michael W. Reese suggests that CISOs should consider negotiating clauses that allow them to have a private attorney review legal documents before public disclosures. This move seeks to address potential conflicts of interest and ensures independent legal counsel for personal protection.

Embracing Ethical Practices:

The experts advocate for a robust Ethics program, fostering an environment where potential deceptive practices are flagged early on. Having an Ethics Committee in place can provide an additional layer of scrutiny, ensuring that disclosures align with ethical standards.

ย 

Moving Forward: Advice for CISOs

Proactive Indemnification:

Jim Routh emphasizes the need for CISOs to be proactive in negotiating indemnification protections. This includes securing coverage for personal legal defense, separate from the legal representation provided to the enterprise. This proactive approach aligns with the changing dynamics in the cybersecurity landscape.

Shaping the Future CISO Role:

Michael W. Reese envisions three fundamental changes in the CISO role: enhanced identity access management processes, increased influence over security incident reporting, and a shift in focus during negotiations, where CISOs spend more time negotiating indemnification protection.

ย 

Conclusion

As we navigate the aftermath of the SolarWinds Breach, CISOs find themselves at a pivotal juncture. The path forward involves embracing transparency, negotiating for personal protection, and actively shaping the future of the CISO role. Matthew Rosenquist, Jim Routh, and Michael W. Reese provide invaluable insights, setting the tone for a new era in cybersecurity.

Join the Conversation

Ready to engage with the cybersecurity community? Join CISO Platform, where professionals gather to share knowledge, experiences, and insights. Strengthen your network, stay informed, and be part of the conversation that shapes the future of cybersecurity.

Read moreโ€ฆ

Our community members Prabhakar Ramakrishnan (CISO, TNQ Publishing) and Dr. Jagannath Sahoo (CISO, Gujarat fluorochemicals) are speaking on โ€œDigital Personal Data Protection (DPDP): Practical Approaches For CISOsโ€

The bill aims to protect individual data and regulate data practices. CISOs should be aware of the new requirements to avoid penalties.

ย 

Topic : (Chennai Task Force) Digital Personal Data Protection (DPDP): Practical approach for CISOsย 

Date & Time : 23 November, Thursday, 4 PM (IST)ย 

>> Registration Link : https://bit.ly/webinar-DPDP-Nov2023ย 

ย 

ย 

Key Discussion Points/ Agenda:ย 

1. Introduction to Data Privacy

- What is data privacy

- Privacy laws around the globe

- DPDPA Journey

2. Understanding the New Indian DPDPA 2023

- Objectives

- Principles of DPDPA

- Applicability

- Rights & Duties of Individuals

- Principals

- Legal implications/penalties

3. A practical approach to DPDPA compliance

- Personal data Inventory

- DPIA

- Risk treatment

ย 

Request members interested in the topic to register and also share with your teams and peers who may not be in the group. It is an important topic on 'DPDP for CISOs' and very relevant at the moment.ย 

>> Registration Link : https://bit.ly/webinar-DPDP-Nov2023ย 

ย 

ย 

ย 

Read moreโ€ฆ

We are hosting a community Panel discussion onย "Cybersecurity Breach At SolarWinds: Legal Implications And CISO Ramifications". Panelists includeย Matthew Rosenquist (CISO, Eclipz.io Inc), Jim Routh (Former CISO JP Morgan & Chase, Chief Trust Officer Saviynt), Michael W. Reese (CIO | CISO Charge EPC)

ย 

You might have noticed it over the internet, the cybersecurity community is discussing on SEC Charging SolarWinds and Its CISO. In a recent move, the US Securities and Exchange Commission (SEC) has filed charges against SolarWinds and its chief information security officer (CISO) for reportedly concealing crucial information about cybersecurity vulnerabilities and risks from investors for two years prior to the revelation of a major cyberattack. It is important to understand the implications and best practices a CISO can do in their position.

ย 

Key Discussion Points :

  • Overview of charges/complaint-details?
  • Implications for security posture and reporting?
  • Will this case set a precident?
  • Is the SEC sending a message?
  • Concerns of industry CISOs?
  • How should CISOs adapt?

ย 

You can join us here: http://surl.li/nghwl

12293433500?profile=RESIZE_710x

ย 

Please Note : Since the speakers are across the globe, the timings might be odd. In case the time does not suit your timezone, kindly register yourself, so you can get access to the recording post-session.

ย 

Read moreโ€ฆ