Cybersecurity learning is a critical part of any cybersecurity program. Cybersecurity professionals must
continuously upgrade their knowledge to cope with the rapid evolution of cyber threats. Organizations
need new skills to confidently deploy emerging technologies that power competitive advantage....
Cybercrime is growing exponentially. Developing a robust cybersecurity workforce is vital for enterprises to address the evolving cyber threat landscape effectively.
Decision-makers and cybersecurity leaders should drive effective defense by implementing actionable steps, empowering them to build a skilled,...
Beyond advising the seniormost levels of the business in the strategic use of technology, the need to recruit new cybersecurity professionals often also tops the list of tasks facing today's security leaders, says Rob Hornbuckle, CISO of Allegiant Air.
We've talked a lot in recent times about data breaches and data loss. But what about pure data integrity - not just whether it can be stolen, but whether it can be secretly altered?
This is a topic close to the heart of Diana Kelley, a cybersecurity field CTO for Microsoft. She has addressed the topic at recent ISMG...
GDPR. NIST CSF. NY DFS. These acronym laws and standards can be maddening to navigate clearly for legal and compliance teams. Particularly when the threat landscape is ever evolving, and the threat actors - from outside and within - are unrelenting. This is why we have designed these sessions as an opportunity for...
This month we spotlight the critical cybersecurity challenges facing healthcare sector organization. Explore why a focus on compliance-driven security risk programs can put entities at a great disadvantage in dealing with these challenges - and what's needed to implement a more war-minded approach to battle the...
It's no secret that the healthcare industry is increasingly under attack by cybercriminals. And risky end-user behaviors are only exacerbating the threat. Yet, user awareness training is always a challenge for organizations. How do you effectively train users to stop clicking on links or opening attachments? This...
The insider threat. It could be the malicious insider who intentionally sets out to commit fraud, steal intellectual property or cause damage. Or else it could be the so-called "accidental insider" who makes a mistake or is taken advantage of by an external threat actor. Either way, the business impact is real, and...
November 1 ushers in a whole new era of breach notification requirements for Canada. What are the new standards, and how prepared are Canadian organizations? In this edition of Security Agenda, attorney Imran Ahmad of Miller Thomson LLP shares insights. Among them:
"In many ways, Canada had been playing catch-up to...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features the world's first CISO, Stephen Katz, discussing how the role of the modern CISO has evolved. Another key influencer, Gartner's Avivah Litan, discusses the lure of blockchain. This edition...
As customers spend more and more money online each year, the opportunities for fraud increase in parallel; experts project a loss of $24 billion to payment card fraud by the end of 2018. Payment card fraudsters rely on a sophisticated ecosystem and support network that provides a wide range of credit card details,...
The alluring promise of gold inspired almost half-a-million to risk it all and rush to California in the mid-20th century in hopes of striking it rich. Although gold mining was fruitless for the most part, cunning opportunists profited off of desperate '49ers by selling synthetic gold or mines of no real value. A...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Federal Reserve's Jim Cunha on the future of secure payments. Another influencer, Amazon Web Services' Keith Carlson discusses future proofing against fraud. This edition also highlights...
Government cyber teams must adopt a modern and evolving security operations model and an analytics-driven approach to cybersecurity if they hope to keep pace with the evolving threat landscape.
With the advent of technology in personal healthcare - internet connected glucose monitors, intravenous blood pressure monitoring, personal best friend emotional bots - a lot of highly sensitive data that's rampantly traversing the airwaves. The impact of this data getting in the wrong hands is just starting to be...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.