How does one begin to secure the digital transformation journey in two legacy enterprises? Kush Sharma, principal for Sharma and Company and former CISO for the city of Toronto, shares his experience and offers advice on investing in and integrating technologies.
Digital transformation and the advent of continuous delivery in software engineering has created a new demand for continuous security. This evolution requires a shift of mindset for most security teams, says Karl Mattson, CISO of Noname Security. He discusses the challenges and benefits.
An effective security control program should focus on people and processes and not just technology, says Ashwin Ram, cybersecurity evangelist with Check Point. Ram also shares his insights on data breach trends.
CyberEdBoard Executive Member Dr. Deepak Kumar gives the keynote speech at ISMG Virtual Cybersecurity Summit Asia: Financial Services. The session addresses how banking and financial services organizations can take steps to invest in operational speed, drive value from new investments, enhance their training and...
CyberEdBoard Executive Member Charmaine Valmonte speaks at the ISMG Virtual Cybersecurity Summit Asia: Financial Services. Topics include our new realities and emerging technologies, why we need a cybersecurity maturity model, and the importance of identity management and governance.
CyberEdBoard member Maria Filomena Gibe speaks on a panel at ISMG Virtual Cybersecurity Summit Asia: Financial Services. The panel discusses:
• How "zero trust" has made security a business enabler;
• Building a multifactor authentication model based on zero trust;
• Building a zero trust framework aligned...
Thought leadership is crucial within the threat intelligence sharing community and developing technologies that easily share and use threat intelligence, as a nation we can help agencies identify and stop attacks aggressively and quickly.
During the podcast, you can anticipate a healthy discussion on:
The value of...
Tomislav Pericin, Co-founder and Chief Software Architect for ReversingLabs, discusses the evolution of supply chain attack sophistication, and why both software builders and buyers need to change how they defend against attack surface area risks.
It was one thing to secure employees in a central office; quite another to secure them at home. What happens now in the hybrid workforce? Mike Anderson of Netskope outlines the key cybersecurity recommendations from his 'Return to Work' playbook.
Applications, the network, security - they all have been affected by the seismic changes of the past year, and they drive the need for adopting the "zero trust" model. Zscaler CEO Jay Chaudhry and Nexteer Automotive CISO Arun DeSouza discuss the necessary mindset shift.
The global fraud landscape has shifted dramatically in the past year. Uri Rivner and Erin Englund of BioCatch discuss the urgency of catching money mules, stopping synthetic IDs and schemes that result from deep social engineering.
Sophos recently released its 2021 State of Ransomware report, and it includes surprising findings on remediation costs, which have more than doubled over the past year. Dan Schiappa tackles the question: Does it pay to pay ransoms?
Increased reliance on the agile and remote work model has created more opportunities for MSPs. WatchGuard CEO Prakash Panjwani shares advice on how to engage an MSP that fits into the organization’s business model and establish a good partnership.
The average amount of time that online attackers camp out in a victim's network - or "dwell time" - has been declining, FireEye's Mandiant incident response group reports. But the surge in ransomware accounts for some attacks coming to light more quickly because those attackers announce their presence.