For organizations with legacy systems, effective security and risk management remain essential as they transition to cloud or hybrid environments, says Davanathan "Devan" Naidoo, CIO of New Dimension Corp. He shares essential strategies and lessons learned.
As a veteran cybersecurity leader in the healthcare sector and vendor community, Sonia Arista, currently the global CISO of Everbridge, is not afraid to tear down organizational silos. But she also has a healthy respect for necessary boundaries between distinct corporate functions.
Sunder Krishnan, chief risk officer at Reliance Nippon Life Insurance Co., a joint venture of Reliance Capital and Nippon Life, discusses risk management approaches; using PAM, data encryption and other processes to safeguard customer data; and investing in behavioral systems to secure data.
David Pollino, former CISO of PNC Bank, joins two editors at ISMG to discuss what organizations can do to harden their cybersecurity defenses, how we need to think about our adversaries differently in today's threat landscape and how the "Great Resignation" is affecting cybersecurity.
In the latest "Proof of Concept," Lisa Sotto, partner and chair of the global privacy and cybersecurity practice at Hunton Andrews Kurth LLP and David Pollino, former CISO at PNC Bank, join Information Security Media Group editors to discuss U.S. regulatory trends and supply chain risk management.
Financial institutions must be aware of artificial intelligence being used by criminals against them, says John Buzzard, lead analyst, fraud and security, Javelin Strategy & Research. He discusses the findings of Javelin's latest identity fraud report.
As CISO of publishing company Penguin Random House, Deborah Hawarth works on managing the convergence of IT, OT and IoT. A key step, she says, is ranking the risks posed by vulnerabilities so the organization can prioritize "where we're going to spend our energies and our money in terms of the fix."
Over its 170-year history, MassMutual has collected lots of data, and Anne Coulombe, the head of data protection, must ensure that this information remains secure as the company continues its technological evolution into the cloud era.
In the latest weekly update, four editors at ISMG discuss important cybersecurity issues, including the lessons we can learn from Okta's breach fallout and subsequent response, how the first NFT rug pull of 2022 has amounted to over $1 million, and the much-anticipated return to in-person events.
As a veteran CISO and security leader, Rick Doten works on a wide array of issues - from developing secure applications for the cloud to carefully managing vendor relationships. At the same time, he's developing the next generation of cybersecurity leadership.
Harold Moss, the CEO of Tautuk, has a background in building products, but many in cybersecurity do not come from a product background. In this interview with Brian Barnier, he discusses the importance of context, listening and collaboration for teams to understand creative and critical thinking.
Eighty percent of survey respondents say they either are well on the way or getting started toward becoming a "smart manufacturing company." Cloud migration, business resiliency and securing OT environments are among their priorities. Del Rodillas of Palo Alto Networks analyzes the survey results.
Fifty-three percent of survey respondents say cyberthreats became fiercer during COVID-19, and 17% say the pandemic disrupted their data security initiatives. These are among findings of a new survey sponsored by HelpSystems. Cary Hudgins analyzes the results and discusses how to put them to work.
Entusiasta de segurança ao longo da vida compartilha sua visão sobre como subir na hierarquia para liderar operações de segurança em uma gigante das telecomunicações.
Control is the lifeblood of an effective information security program, but fully locking down endpoints is impossible, not least in the open environment of a public university, says Robert Hellwig, CISO of Germany's University of Siegen. In this exclusive discussion, he recommends approaches.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.