Is your team working constantly to discover and patch critical vulnerabilities across your global hybrid-IT landscape? Traditional vulnerability management solutions stop at only identifying vulnerabilities and don’t help with remediation. Security teams would prefer if they can automatically discover and categorize...
More and more organizations are moving their security tools to the cloud. There are best practices to consider to confidently run applications in the cloud and to integrate security into every phase of a cloud journey. Our panel of experts will share their lessons learned on cloud security and tools.
Join this ISMG...
Third party vendors are often the weakest link in your organization’s security ecosystem, since most security leaders do not have good visibility or oversight of their security controls. But as the recent breach of SolarWinds or HAFNIUM has made clear, managing third party risk is now an essential part of your...
The key components of an effective "zero trust" architecture include multifactor authentication, network segmentation and a defense-in-depth approach, says Dr. Erdal Ozkaya, regional CISO and managing director at Standard Chartered Bank in the United Arab Emirates.
Just as it's necessary to think about security before throwing yourself into the clouds when paragliding, the same holds true for large healthcare organizations migrating data to the cloud. Whether it's your first 'flight' in the clouds or you've been gliding for a while, there are security and compliance best...
Even before the pandemic set us on the road to a global recession, many banks were struggling to balance the polarising pressures of a changing world and keeping to business as usual.
The "zero trust" model can play a critical role in mitigating emerging threats. That's why Information Security Media Group will host on Aug. 4 a virtual cybersecurity summit for Southeast Asia on applying the model.
With most employees working at home during the COVID-19 pandemic, it's more important than ever for businesses to ensure that their third-party providers have adequate business continuity plans in place to ensure uninterrupted service, says Srilanka-based Sujit Christy, global CISO at John Keells Holdings.
To ensure data is protected, business units must work closely with IT and security specialists to resolve data governance issues, says Sydney-based Prashant Haldankar, CISO at Privasec.
Security leaders in enterprise energy organizations face the challenge of assessing the efficiency of their cybersecurity program, planning proactive risk mitigation, and communicating their posture across all levels of the organization from the Board of Directors to auditors and asset owners.
Read this case study...
As an IT or OT security leader, you must be able to communicate cybersecurity compliance, risk posture, and Return on Security Investment (ROSI) to management. Hundreds of these security leaders have already made the transition to an integrated risk management approach to cyber program management, reconfiguring the...
The global nature of business and the presence and impact of cyber adversaries make it an organizational imperative to consistently re-assess the effectiveness of our security practices. Adopting best practices have become essential to consistently managing enterprise risk. Zero Trust offers security practitioners a...
The Insurance Authority of Hong Kong has issued cybersecurity guidelines - including data breach reporting requirements - with a compliance deadline of January 2020. What else is now required?
The National Internet Exchange of India, an autonomous body under the Ministry of Electronics and IT that maintains the .In registry and country code Top Level Domains, has switched to a new outsourcer for operations and maintenance. Some security experts are criticizing the move.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.