CIS guide on "The Cost of Cyber Defense: Implementation Group 1 (IG1)," designed to address key questions, including:
- What initial protections should you prioritize?
- What tools are necessary for deploying these protections?
- What will the implementat
CIS guide on "The Cost of Cyber Defense: Implementation Group 1 (IG1)," designed to address key questions, including:
Nations are investing heavily in offensive cyber capabilities. The proposed 2026 US defense budget earmarks an additional $1 billion in funding for offensive cyber operations, specifically to the US Indo-Pacific Command (USINDOPACOM). In 2025, the De
The rapid adoption of AI brings cybersecurity concerns. The value of AI systems is predicated on the breadth of access the system possesses to information and systems which contain sensitive data. We must recognize the challenges early, so we can man
The digital realm has permeated every facet of modern life, leaving an indelible mark on the legal landscape. Electronic evidence, encompassing emails, messages, social media posts, and digital documents, has become a cornerstone in legal proceedings
This case, adjudicated under the Information Technology Act, 2000, involves a significant breach of cybersecurity and financial fraud. The Complainant, Dhule Vikas Sahakari Bank Ltd. (DVSB), a cooperative bank, alleg
Join me on Thursday May 1st, 11am PT as a guest with Defendify on a live webinar where I’ll discuss practical cybersecurity leadership for IT teams!
Communicating cyber risk in business terms to secure support and resources
Importance of planning and p
Cybersecurity empowers businesses to soar, this is how. The modern day notion that “cybersecurity is a business enabler” is a very popular one. The problem is that most of the people singing that tune are cybersecurity leaders trying to get their mes
In today’s fast-paced healthcare environment, efficiency, accuracy, and speed are more important than ever. One critical area where many healthcare providers face bottlenecks is the prior authorization process. Prior authorization, or prior auth, is
We’re excited to bring you an insightful fireside chat on "Navigating the Cyber Insurance Landscape: Key Considerations for CISOs" with Dan Bowden (Global Business CISO, Marsh McLennan (Marsh, Guy Carpenter, Mercer, Oliver Wyman)) and Erik Laird (Vic
Something happened this weekend — starting on Monday my cellphone has been lighting up with unknown callers — a 30x increase!
I rarely give out the number so I assume one of the following:
1. Ended up on a cybercriminal call-list because of a Data Bre
Geopolitical Warfare is driving change and adaptation across the globe. Nation States are seeking innovative methods to pursue their foreign policy agendas. They are blending tradition kinetic methods with social and cyber tools that greatly increase
We had a community fireside chat on "The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem" with Matthew Maynard (Security Operations Specialist, BJC Healthcare) & Erik Laird (Vice President - North America, FireCompass), where we delv
Cybersecurity professionals have long relied on vulnerability databases and CWE lists, but NIST's Bugs Framework (BF) brings a refreshing formalism and extensibility to the field. Developed by Irena Bojanova and detailed in NIST Special Publication 8
Modern cyber defenses increasingly need to be identity-centric. Many industry thought leaders have honed in on this giving rise to the often heard “identity is the new perimeter”. Consequently, attackers do indeed now find it easier to log in rather
I am very glad that the Common Vulnerabilities and Exposures (CVE) program was re-funded by the US Government, specifically CISA (Cybersecurity and Infrastructure Security Agency), but this last-minute catch has raised serious concerns with the recen
The power of signals, or indicators, is evident to those who understand them. They are the basis for identity risk intelligence and it’s role in disinformation security. For years, cybersecurity teams have anchored their defenses on Indicators of Com
Welcome to the March edition of CISO Platform Highlights – your quick snapshot of the most insightful content, expert conversations, and community updates from the world of cybersecurity leadership.
This month, we explored one of the industry's most
In the ever-evolving world of healthcare, prior authorization remains one of the most time-consuming and error-prone administrative processes. Before certain medications, procedures, or treatments can be administered, healthcare providers must obtain
In today’s hyper-connected world, businesses face an ever-growing range of cyber threats. From ransomware attacks to data breaches, the need for robust cybersecurity infrastructure is more critical than ever. Choosing the right information security p
We’re excited to bring you an insightful fireside chat on "The Dark Path of Stolen Data: Understanding the Cybercrime Ecosystem" with Matthew Maynard (Security Operation Specialist, BJC Healthcare | Incident Response Analyst | Ethical Hacker | Dark W
CISO Platform Talks: Security Fireside Chat With a Top CISO
Join us for the CISOPlatform Fireside Chat, a power-packed 30-minute virtual conversation where we bring together some of the brightest minds in cybersecurity to share strategic insights, real-world experiences, and emerging trends. This exclusive monthly session is designed for senior cybersecurity leaders looking to stay ahead in an ever-evolving landscape.
We’ve had the privilege of…
We are pleased to invite you to an exclusive roundtable series hosted by CISO Platform in partnership with FireCompass. The roundtable will focus on "New Guidelines & CISO Priorities for 2025"
Date: December 1st - December 31st 2025
Venue: Delhi, Mumbai, Bangalore, Pune, Chennai, Kolkata
We’re excited to bring you an insightful fireside chat with Sandro Bucchianeri (Group Chief Security Officer at National Australia Bank Ltd.) and Erik Laird (Vice President - North America, FireCompass).
About Sandro:
Sandro Bucchianeri is an award-winning global cybersecurity leader with over 25…