Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber warfare.
The 10 most significant events regarding government cybersecurity in 2009 saw its genesis with the inauguration of a Blackberry-toting chief executive, the most tech-savvy president to occupy the Oval Office.
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber...
In terms of information security, what is the state of auditing as we end 2009 - and what are the trends foreseen for 2010?
Warren Stippich Jr., Practice Leader of the Chicago Business Advisory Services Group of Grant Thornton LLP, discusses:
Audit trends;
Where organizations are most vulnerable;
How audit...
When it comes to protecting their customers' identities, how do the major banking institutions rate?
Javelin Strategy & Research has just released a new Banking Identity Safety Scorecard that ranks the major institutions. In an exclusive interview about the report, James Van Dyke discusses:
How the scorecard was...
No question, the information security professional's role has evolved in recent years. How, then, has the need for ongoing professional education also changed? And what role must risk management play in today's security organization?
In an exclusive interview, Mark Lobel of PricewaterhouseCoopers and ISACA,...
Northrop Grumman Corporation has invited three of the nation's leading research institutions to join a Cybersecurity Research Consortium to advance research in this field.
Cybersecurity, forensics, risk management -- what will be the core security skills needed in organizations in 2010?
In an exclusive interview, Kent Anderson, founder and managing director of Encurve LLC, as well as a member of ISACA's Security Management Committee, discusses:
The core security skills now needed...
2009 was a tough year in many ways -- economic recession, massive layoffs, high unemployment rate, scores of bank failures.
But there is good news for information security professionals looking for jobs within the public and private sectors in 2010. There are jobs aplenty, thought leaders say, for information...
What have been the biggest privacy issues of 2009, and what emerging trends should you watch heading into 2010?
We posed these questions to J. Trevor Hughes, Executive Director of the International Association of Privacy Professionals (IAPP). In an exclusive interview, Hughes discusses:
The role of the...
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
Governance, risk and compliance - GRC - are priorities for information security leaders of all organizations. And these priorities have only been underscored by the economic recession and elevated scrutiny of businesses and government agencies.
Federal rules now require institutions to manage their data so it can be produced quickly and completely if demanded by district court cases.
In this session Deputy CISO David Matthews will use his first-hand experience to provide your organization up to date information and documents on:
Compliance with Federal...
Organizations are leaping to embrace "cloud computing" - accessing virtualized resources via the Internet. But are they jumping too soon without weighing all the legal considerations regarding security and privacy? Register for this webinar to hear a government security leader's expert insights on:
e-Discovery and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.