How has cybersecurity technology evolved, and are legal frameworks keeping pace with the evolution? Dr. Pavan Duggal, an advocate at the Supreme Court of India, shares his journey and talks about his passions.
Beyond advising the seniormost levels of the business in the strategic use of technology, the need to recruit new cybersecurity professionals often also tops the list of tasks facing today's security leaders, says Rob Hornbuckle, CISO of Allegiant Air.
Control is the lifeblood of an effective information security program, but fully locking down endpoints is impossible, not least in the open environment of a public university, says Robert Hellwig, CISO of Germany's University of Siegen. In this exclusive discussion, he recommends approaches.
Sri Lanka-based Sujit Christy, group CISO at John Keells Holdings PLC, says his passion is empowering security practitioners with the right skills and knowledge and ensuring they speak the right language. He discusses cybersecurity adoption and enablement.
Ransomware, business email compromises and the malicious insider threat: These are the three top concerns of Canadian attorney Imran Ahmad as he looks ahead to the cybersecurity legal landscape in 2020.
We caught up with Ahmad at our Toronto Cybersecurity Summit in September. Among the insights he shared: The rise of...
As breaches become more commonplace in India, law enforcement agencies are leveraging new technologies to assist in investigations. This edition of CyberEd APAC features an interview with Brijesh Singh, inspector general of police for cyber in Maharashtra, who outlines the challenges in investigating breaches and the...
With new threats targeting the nation's critical infrastructure, partnerships among government and private-sector security professionals are more critical than ever, says Brian Harrell of the U.S. Cybersecurity and
Infrastructure Security Agency. Harrell was a featured speaker at ISMG's recent Cybersecurity Summit in...
Medical device security: Awareness of this significant challenge has grown dramatically over the past few years. But Michael McNeil, global security officer at device manufacturer Philips, argues that cybersecurity is
still years behind where it should be, so stakeholders are playing catch-up.
McNeil spoke recently...
Where is the data? Who has access to it? How is it being secured? These are the fundamental questions inherent in any third-party risk management program. And in this edition of CyberEd Magazine, Cris Ewell, CISO of UW Medicine, shares insights from his experience managing vendor risk. Ewell's single biggest message:...
It's been nearly seven years since HSBC was fined $1.9 billion by U.S. authorities for money laundering violations involving international drug cartels. But Everett Stern, the former employee who blew the whistle on the bank, continues to tell his story because he believes similar criminal activity is ongoing. And he...
From the days of Rosie the Riveter, women have been closing the ranks in the disparity in gender in the workplace. Why, then, do women in the tech sector lag woefully behind?
Ann Sung Ruckstahl, senior vice president and chief marketing officer for Unisys, recently discussed the challenges "We're still in the middle...
Why trust a former black hat? Hector Monsegur, a former member of LulzSec, discusses why his unique perspective is so valuable.
"Cybersecurity is a young industry that's starting to spread awareness and starting to really develop organizations' security postures," he says. "It's good that we have general awareness....
We've talked a lot in recent times about data breaches and data loss. But what about pure data integrity - not just whether it can be stolen, but whether it can be secretly altered?
This is a topic close to the heart of Diana Kelley, a cybersecurity field CTO for Microsoft. She has addressed the topic at recent ISMG...
GDPR. NIST CSF. NY DFS. These acronym laws and standards can be maddening to navigate clearly for legal and compliance teams. Particularly when the threat landscape is ever evolving, and the threat actors - from outside and within - are unrelenting. This is why we have designed these sessions as an opportunity for...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.