Blog (927)

Curveballs%20and%20Tabletop%20Exercises%20Keeping%20Executives%20Engaged%20and%20Focused.png?profile=RESIZE_710x

 

They offers valuable takeaways for conducting successful cybersecurity crisis drills, emphasizing participant engagement and actionable outcomes.

 

 

 

Here is the verbatim discussion: 
what do I mean by that like they would come in day one
Read more…

Surviving%20a%20Cyber%20Storm%20How%20Preparation%20and%20Teamwork%20Saved%20the%20Day.png?profile=RESIZE_710x

 

 This blog post features Dan's career experiences in cybersecurity, including crisis management and drill participation.

 

 

 

Here is the verbatim discussion:
so you kind of have the forming storming norming kind of thing and this was our s
Read more…

Navigating%20The%20Evolving%20Cybersecurity%20Landscape.png?profile=RESIZE_710x

This blog post offers cybersecurity predictions for 2021, emphasizing the evolving threat landscape and the need for continuous improvement.

 

 

 

 

Here is the verbatim discussion:
But remember that every time you do this it's it's it's diffe
Read more…

Harnessing%20the%20Power%20of%20Habits%20for%20Improved%20IT%20Security%20A%20Guide%20for%20RSA%20Conference%20Attendees.png?profile=RESIZE_710x

 

Welcome, fellow security enthusiasts! As we gather once again at the RSA Conference, amidst the buzz of innovative technologies and strategies, it's crucial to reflect on a fundamental aspect often overlooked in the realm of cybersecurity: human b

Read more…

Unraveling%20the%20Illusion%20of%20Control%20The%20Power%20of%20Habits%20in%20Human%20Behavior.png?profile=RESIZE_710x

 

Welcome, esteemed attendees of the RSA Conference, to a discourse on a fundamental truth often obscured by the veneer of consciousness: our lack of control over our own actions. Despite our fervent belief in our autonomy, the reality is that much

Read more…

Beyond%20Awareness%20Unveiling%20the%20Power%20of%20Habits%20in%20Cybersecurity.png?profile=RESIZE_710x

 

Greetings, esteemed participants of the RSA Conference, as we convene amidst the bustling nexus of cybersecurity discourse, it's paramount to recognize a pivotal yet often overlooked aspect of our collective security posture: human behavior. In an

Read more…

 

Shaping%20Group%20Behavior%20Harnessing%20the%20Science%20of%20Habits%20for%20Organizational%20Culture.png?profile=RESIZE_710x

 

Greetings, fellow cybersecurity enthusiasts! As we gather once again, this time in Singapore, it's my privilege to embark on a journey of evolution and exploration from my previous talk at RSA Conference USA. Building upon the foundation laid in

Read more…

Breaking%20Down%20Silos%20The%20Imperative%20of%20Integration%20in%20Cybersecurity%20Technologies.png?profile=RESIZE_710x

 

Greetings, fellow cybersecurity professionals! As we navigate the ever-evolving landscape of digital threats and vulnerabilities, it's imperative to acknowledge a pervasive challenge hindering our collective defense: the fragmented nature of cyber

Read more…

Strengthening%20Cyber%20Resilience%20Best%20Practices%20for%20Crisis%20Drills%20and%20Tabletop%20Exercises.png?profile=RESIZE_710x

 

In the ever-evolving landscape of cybersecurity, enterprises face the constant threat of cyberattacks. To fortify their defenses and enhance their preparedness, organizations must conduct regular tabletop exercises for cyber crisis management. Dra

Read more…

Predicting%20Ransomware%20How%20A%20Cybersecurity%20Tabletop%20Exercise%20Saw%20The%20Future.png?profile=RESIZE_710x

 

This blog post discusses conducting successful cybersecurity crisis drills, emphasizing the importance of scenario planning and participation by key stakeholders.

 

 

 

 

 
So we're like how do we do that wel
Read more…

WormGPT: The Dark Side of AI

Blog%20image%202.png?profile=RESIZE_710x

 

Artificial Intelligence (AI) has been a boon to many industries, providing solutions to complex problems and enhancing efficiency. However, like any powerful tool, it can be misused. One such instance is the creation of WormGPT.

What is WormGPT

Read more…
RSS
Email me when there are new items in this category –

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership