In this episode of "Cybersecurity Unplugged," Roger Sels, vice president, solution, EMEA at BlackBerry, discusses the global threat landscape one year after SolarWinds, including cyberthreats from Russia and China; the cyber impact of the Russia-Ukraine war; and the cyber call to action.
Ransomware and nation-state threats are daunting. But the threat that concerns Mustapha Kebbeh the most is supply chain risk. The Brinks CISO discusses how he has tackled this, as well as the challenges of tool complexity and peer collaboration.
Harold Moss, the CEO of Tautuk, has a background in building products, but many in cybersecurity do not come from a product background. In this interview with Brian Barnier, he discusses the importance of context, listening and collaboration for teams to understand creative and critical thinking.
Eighty percent of survey respondents say they either are well on the way or getting started toward becoming a "smart manufacturing company." Cloud migration, business resiliency and securing OT environments are among their priorities. Del Rodillas of Palo Alto Networks analyzes the survey results.
Fifty-three percent of survey respondents say cyberthreats became fiercer during COVID-19, and 17% say the pandemic disrupted their data security initiatives. These are among findings of a new survey sponsored by HelpSystems. Cary Hudgins analyzes the results and discusses how to put them to work.
Michael Lines is working with ISMG to promote awareness of the need for cyber risk management. As a part of that initiative, CyberEdBoard posts draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself." This chapter is "Recognize the Threats."
We look at cybersecurity largely focused on the immediate future. But educator Gary Henderson says we need to look a little further ahead. He makes the case for educating teachers about cybersecurity so they can educate their students, who can then go on to use those best practices in their careers.
In an excerpt from his book "CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide," Peter Gregory discusses choosing the fifth option in risk management, which is ignoring the risk. He warns of the problems that choice can cause.
Human error is the most common portal for cybersecurity breaches. So it stands to reason that human talent is the most valuable defense against attacks.
But how can organisations reduce risk by making humans the strongest link in the cyber defense line?
View this UK & EU Leadership Session lead by the Tech...
Many security practitioners take a check-box approach to cybersecurity, which prevents them from seeing the whole system. John Remo of Warner Music Group discusses how to break out of this pattern and use critical and abstract thinking to examine the deeper workings of the system.
In this CyberEdBoard Expert Insights interview, Agnidipta Sarkar, group CISO of Biocon Group, says organizations and CISOs are still missing the boat when it comes to treating cybersecurity as a business issue, but leaders can learn to think differently to protect against today's cyber incidents.
SecurityScorecard provides analysis of organizational cyber hygiene through a rating system, while LIFARS, a digital forensics firm, has offered witness testimony for major federal cybercrime cases involving nation-state threat actors. CEOs for both firms tell ISMG why their merger is significant.
People think cloud is a silver bullet, but it’s not. It's not even copper. And people think cloud it easy and someone else’s problem. But it's not. The cloud is nothing more than a highly resilient, outsourced data center with a lot of bells and whistles.