Andres Andreu, SVP and CISO of 2U Inc., talks about a methodical approach for analyzing the expanding attack surface. The podcast divulges how he has worked to protect the PII of users and the sensitive intellectual property of the institution from being compromised.
The role of a CISO has become increasingly complex and challenging. In some cases, a CISO may even need to act as a whistleblower if things go wrong. Whistleblowing has brought more visibility to CISOs, says Steve Zalewski, former CISO at Levi Strauss & Co.
In this episode of "Cybersecurity Unplugged," David Derigiotis of insurtech Embroker discusses the complex world of cyber liability insurance, including the collapse of crypto exchange FTX, recent breaches, and improvements in the cyber insurance industry.
After years of digital transformation, cloud migration and deployment of hybrid workforces, enterprises have more endpoints than ever, which makes it important to take endpoint security to a whole new level. Pat Correia of Cisco Security shares five tips for choosing endpoint security.
The U.S. Army has embarked on its zero trust journey for both its information and network operations. Army CIO Dr. Raj Iyer shares how the military and the private sector are partnering to secure cloud infrastructure and solidify threat intelligence capabilities to fight adversaries.
In Part 1 of this exclusive two-part series, Dr. Raj Iyer, CIO of the U.S. Army, lays out the vision for 2023-2024, which includes a tectonic shift from on-premises data centers to cloud and modernization and the migration of over 5,000 applications to augment war-fighting capabilities.
Data and analytics practitioners focus a lot on the delivery and implementation of their platforms and their tools and the integration of data from different sources. But unless they align with business purpose, business value, goals and outcomes, they will not necessarily achieve that value.
New industry guidance provides a detailed road map to help healthcare sector entities respond to and recover from cyberattacks involving extended IT outages, say Lisa Bisterfeldt and Kirsten Nunez, who are members of the Health Sector Coordinating Council task force that developed the resource.
The cost of a data breach is mighty. And for healthcare entities, the cost of a HIPAA violation also can prove costly. Greg Hoffman of Paubox shares five critical steps you might be overlooking to ensure emails remain HIPAA-compliant and tells how to take compliance responsibility out of human hands.
Addressing digital payment security challenges requires having good identity verification capabilities as well as a strong authentication process that's friction-free for consumers, says Singapore-based Gautam Aggarwal, senior vice president and regional chief technology officer, Asia Pacific, at Mastercard.
India's draft data protection bill takes a "harm-based" approach rather than the preferred "rights-based" approach, argues Shashank Mohan, counsel at the Software Freedom Law Center, which provides pro bono legal representation to not-for-profit developers of open source software.
We all know about May 25 and the enforcement deadline for Europe's General Data Protection Regulation. But what impact will GDPR have on cybersecurity programs? Danny Rogers of Terbium Labs weighs in on the topic.
In many enterprises, the CISO reports to the CIO, and occasionally you find a CIO who reports to the CISO. But Venafi's Tammy Moskites holds both roles. How does she manage the natural tension between IT and security?
ISACA just issued COBIT 5 for Information Security, a business-centric approach to governance and IT management. ISACA's Robert Stroud explains what COBIT 5 means to your organization.
Organizations are doing a good job protecting their operating systems, but they're leaving their critical applications vulnerable to dangerous cyber threats.
This is the key takeaway - and to some extent the surprise - of the new Top Cybersecurity Risks report released on Sept. 15 by TippingPoint, Qualys, the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cio.inc, you agree to our use of cookies.