My recent interview with Mark Byrne, from Cybx Security, covered a great range of cybersecurity questions, including new threats and solutions, Artificial Intelligence, DevSecOps, cybercrime, security impacts of Coronavirus, and the future of cyberse
At CISO Platform Annual Summit 2020, we had a panel discussion on the topic of Third Party Risk Management: Checklists, Frameworks & Tools, including industry stalwart like Sunil Varkey [HSBC] (Moderator), N D Kundu [Bank of Baroda], Jitendra Chauhan
The Coronavirus pandemic is changing how people receive healthcare with a shift to more remote diagnosis options being rolled out as a first line of care. The advantages are many, but as an unfortunate result, healthcare data breaches will begin to
Third party vendors and suppliers often have access to your network and your organisation's confidential information. The best way to prevent a data breach is to have robust program to assess how your third parties are managing their risk and protect
Counting down to the absolutely worst cybersecurity strategies. Sadly, these are all prevalent in the industry. Many organizations have failed spectacularly simply because they chose to follow a long-term path that leads to disaster. You know who you
What should a CISO do when the executive leadership chooses to ignore critical cyber risks?
If the C-Suite and board are well informed of imperative vulnerabilities and yet choose a path to ignore security, the CISO is put in a position where they ar
Intangibles now account for 90% of the S&P’s total assets and it is no accident that the core of cybersecurity has evolved to protect those aspects of the business. It is a natural progression for security to align with protecting the most important
A free-flowing discussion about the past and future evolution of cybersecurity leadership. I had a great time sharing my personal experiences, industry insights, and a few rants in this podcast interview with Marco Ciappelli and Sean Martin of ITSP
The network security industry recommends that an organization periodically perform risk modeling,assessment, and risk management to anticipate and take pro-active measures against threats.
(Read more: Top 5 Application Security Technology Trends )
Note: this page contains paid content.
Please, subscribe to get an access.