Welcome to the webinar summarizing the survey: Critical Gaps in
Securing Identities. This survey was conducted in Q1 and 2 of 2023, and attracted more than 200
responses from senior cybersecurity professionals.
More than just survey results, this OnDemand webinar offers:
The top organizational challenges in...
Changing technologies and markets require adapting an organization's overall cybersecurity strategy, including the scope of our risk management, and then reviewing and adjusting our operational program to deliver the revised vision, said Akm Hasan, head of cybersecurity at Hays PLC.
Security is about more than technology, said Paul Watts, a distinguished analyst at the Information Security Forum. It's also about people and process, he said, with the ultimate goal of adding value to what the business is trying to do. Watts discussed how security leaders can achieve this goal.
Today's CISO must have close communication with the C-suite, understand the business needs of the organization as well as its objectives and risks, and to be able to articulately translate those business objectives into technology, said Dion Alexopoulos, head of security at Camelot.
Cybercriminals continue to rely on proven attack methods while developing new ways to infiltrate digital environments and break through your human defense layer.
But how can you reduce your organization’s attack surface? We looked at 12.5 million users across 35,681 organizations to find out.
In this webinar...
CISOs aspiring to climb the corporate ladder need to look at their role holistically and become more versatile in influencing teams and leading organizational change, ensuring all stakeholders are part of creating a cyber-safe enterprise, said Vishal Salvi, CEO of Quick Heal.
To outsource a non-core competence...or to risk control, understanding cost implications, and/or ability to evaluate functionality in competing offerings? That's the question...right?
This report has been a collaboration between ISMG and Optiv since the beginning of 2023 when ISMG surveyed 426 senior cybersecurity...
It’s become more and more evident to organizations that new-school security awareness training is an absolute requirement for managing the ongoing problem of social engineering. But how do you develop a program that will deliver the goods without doubling your workload or costing an arm and a leg?
In this...
The first step in managing risk is recognizing it as a boardroom matter, and it demands that directors be prepared to understand and discuss the cyber issue and strategically guide C-level executives on this complex topic. It requires cyber competence in the boardroom, said CISO Marco Túlio Moraes.
The ever-expanding threat landscape and the continued talent shortage mean defenders increasingly need to be ready with the skilled talent to face the onslaught of cybercriminals who are gaining momentum by employing new tactics, according to Pamela Nigro, ISACA board chair.
As a CISO, your mission is to keep your organization ready to handle rising threats and build a strong security culture, but staying ahead of threat actors and risks can be a challenge.
Understanding the current threat landscape is crucial to preparing for today's most significant risks. To help you stay ahead, "5...
The guilty verdict against Joe Sullivan, former chief security officer of Uber, has generated much discussion about CISO accountability for disclosures of breaches. How should CISOs be preparing to deal with this responsibility? Kirsten Davies, CISO at Unilever, said communication is crucial.
Much of the friction between CISOs and their general counsels, according to Ron Raether, partner at Troutman Pepper, is the result of ignorance. General counsels don't understand the full extent of IT and information security and often pin the blame on the CISOs, who become the scapegoats.
Cybercriminals have been launching attacks against our people, networks, and services for decades with varying success. So, the need to realign our defences to meet the demands of evolving threats is nothing new.
CISOs have faced a broad and varied set of challenges in recent years. Remote environments, increasingly sophisticated threats and expanding supply chains are just some of the many concerns keeping them up at night.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.