Conducting Organizational Information Security Assessments
The first step that self-help books suggest when a person wants to change is to perform a self- assessment. By honestly looking at yourself – the good, the bad, and…
DetailsThe first step that self-help books suggest when a person wants to change is to perform a self- assessment. By honestly looking at yourself – the good, the bad, and…
DetailsSome people establish organizations because they want to build something big, or want recognition. But in 2013 when I established the Philippine Institute of Cybersecurity Professionals, I was coming from…
DetailsCISO, Delta Dental Plans Association Cybersecurity is so much about users and the vigilance of people in the organization. Understanding the underlying psychology of the organization, its culture and mindset,…
DetailsThe role of the CISO has evolved greatly over the years. Over the past 20 years leading security practices across multiple industry verticals for large Fortune 500 organizations, I have…
Detailsby Joel Rosenblatt Director for Network and Computer Security Columbia University (Beginning January 28, Joel Rosenblatt will be moderating a group discussion on CISOs Connect. The discussion will run for…
Detailsby Kyle F. Kennedy When you search for images under the key word “cybersecurity,” a familiar shot always turns up: a guy wearing a hoodie, operating in a dark room,…
Detailsby Mark Rasch Google recently disclosed the fact that a vulnerability in its Google Plus configuration could have been used by hackers to expose personal information about users of the…
DetailsIt is standard business practice for organizations to have a contingency plan after acknowledging the various threats and risks that it faces. Having a plan in place, however, is not…
DetailsWhat might the most damaging attacks of the future look like? The answer to the question may lie somewhere between the known patterns that attackers have established over the years,…
DetailsYour organization’s security stance must be supported by everyone in the company, every day, in all that they do. However, people are focused on their jobs, not necessarily on security.…
DetailsDid you know you need just three resources to build a highly effective security program? It’s true. Your success will be highly contingent upon how you leverage people, process and…
DetailsIn 2017, six of the top ten HIPAA breaches reported to the U.S. Department of Health and Human Services (HHS) stemmed from ransomware.[1] In a typical ransomware attack, important data…
Details