[Posted on behalf of Anton Chuvakin, Security Strategy - chronicle Google]
How do you develop a business case for a DECEPTION TOOL?! I just went through a whole bunch of deception vendor materials and I was unpleasantly surprised at the lack of adv
[Posted on behalf of Anton Chuvakin, Security Strategy - chronicle Google]
How do you develop a business case for a DECEPTION TOOL?! I just went through a whole bunch of deception vendor materials and I was unpleasantly surprised at the lack of adv
Mark your calendars. The HMG Live! Silicon Valley CISO Virtual Summit, on Aug 25th 10am Pacific, is a conference for #cybersecurity professionals interested in the latest perspectives on the shifting risks and opportunities of future business.
Come
Regardless whether you’re creating and selling software or you’re just using it to run your daily operation, you are an IT company. Show me a business which doesn’t require technology as an essential element of its strategy and I’ll show you what you
Key Points To Be Discussed :
1. Introduction
2. Inscope items
3. Statistics on BYOD issues worldwide
4. Why we need to think about protection
5. Used Cases before going to create a Playbook
[Open to all for discussion continued on Key Takeaways]
Key
[Posted on behalf of Dennis Leber, Cybersecurity Executive | CISO | Board Member | Educator | Speaker | Author University of Tennessee health science center]
[ Posted on Behalf of Rajeev Shukla, Chief Strategy officer Castellum Labs]
[Posted on Behalf of Archie Jackson, Senior Director and Head of IT & IS, Incedo Inc]
Posted on Behalf of Gary Hayslip, CISO, Softbank Investment advisor]
[Posted on Behalf of Dan Lohrmann, Chief Strategist & Chief Security Officer, Security mentor, Inc.]
Another eventful year online, with more data breaches, malware battles and identity thefts. But the surge in successful, targeted ransomware attacks
[Posted on Behalf of Dan Lohrmann Chief Strategist & Chief Security Officer Security mentor, Inc. ]
From telework mistakes, to virus-related phishing links, to new work processes to nation-state hackers, here’s how the coronavirus creates new opport
You may not have the resources to employ an army of white-hat hackers to stress test your security infrastructure; most organizations don’t. However, you want to make sure that the resources you do have are used in the most effective way.
It’s smart t
[Posted on Behalf of Subbu Iyer Founder and chief Designer Hreemm ]
The Process of Innovation
Globally the understanding of the Process of Innovation has been driven as a populist understanding of Ideas Management. That probably worked when the rate
[Posted on Behalf of Archie Jackson, Senior Director and Head of IT & IS Incedo Inc]
There is a #global new normal during the #COVID19 #pandemic of working from home. Be it any industry, the mode of operation has limited to the boundaries of reside
[Posted on Behalf of Anton Chuvakin Security Strategy - chronicle Google ]
Lets think about this together -- can you really jump to the “next curve” in security, or do you have to travel the entire journey from the old ways to the cutting edge?
Th
I was recently asked an interesting question: What are are the Top 5 CISO frustrations with the cybersecurity industry?
After a few minutes of deep thought and half a cup of coffee later (my 4th big cup of the day), this is what I came up with:
Top 5 C