All Posts (2199)

Sort by

[Webinar] BYOD Security

Key Points To Be Discussed :

1. Introduction
2. Inscope items
3. Statistics on BYOD issues worldwide
4. Why we need to think about protection
5. Used Cases before going to create a Playbook

[Open to all for discussion continued on Key Takeaways]
Key

Read more…
Views: 70
Comments: 0

Leadership Traits & Principles

[Posted on behalf of Dennis Leber, Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author  University of Tennessee health science center]

 
 
Everyone loves a great leader development article.

My leadership was developed in the US
Read more…
Views: 56
Comments: 0

Work-Life Balance is NOT what you need

[Posted on Behalf of Archie Jackson,  Senior Director and Head of IT & IS, Incedo Inc]

 
Balance is a situation in which different elements are equal or in the correct proportions and putting them in a steady position so that it does not fall.

In cont
Read more…
Views: 66
Comments: 0

Is the Coronavirus Creating Data Breaches?

[Posted on Behalf of Dan Lohrmann Chief Strategist & Chief Security Officer Security mentor, Inc. ]

From telework mistakes, to virus-related phishing links, to new work processes to nation-state hackers, here’s how the coronavirus creates new opport

Read more…
Views: 20
Comments: 0

Innovation & Growth

[Posted on Behalf of Subbu Iyer Founder and chief Designer Hreemm ]

The Process of Innovation
Globally the understanding of the Process of Innovation has been driven as a populist understanding of Ideas Management. That probably worked when the rate

Read more…
Views: 17
Comments: 0
[Posted on Behalf of Dan Lohrmann, Chief Strategist & Chief Security Officer Security mentor, Inc.]
As the governments lift stay-at-home emergency orders, organizations are grappling with what it means to reopen offices. What will change? Will telewo
Read more…
Views: 60
Comments: 0

Incident Response. Missing?

[Posted on Behalf of Rajeev Shukla, Chief Strategy officer Castellum Labs]
Incident Response. Picture of a Failed One !

Recent Wipro fiasco on Breach reported by noted security researcher, Brian Krebs, is a study in either lacking incident response, o
Read more…
Views: 41
Comments: 0

Strategy - How CISOs Build Their Road Map

[Posted on behalf of Gary Hayslip CISO  Softbank Investment advisor]
Recently, I addressed a group of security professionals, and our discussion was on how CISOs develop their strategy. I found many in the audience had no idea how security executives
Read more…
Views: 30
Comments: 0