Over the last several years, it has become commonplace for the media to publish information based on electronic materials that have been removed or copied either by organizational insiders and/or external people or groups. The publication of this type of material has impacted individuals, public and private organizations and various government agencies. While it is important for a free society to have the benefits of a free press serving as one of the checks and balances to protect citizens from abusive practices, we may have reached a point where we should re-examine how this is practiced. Are our criminal and civil statues effective on these issues?
BYOD is either a ticking time bomb or IT’s greatest opportunity. Whether you belong to the 40 percent of organizations that have policies or not, I guarantee people are using their own mobile devices at your office.
At some point during your career you will find yourself interacting with a search firm and/or a recruiter who has been assigned a project to fill a professional level security risk related role. This firm may or may not have a specialty security risk related practice and may or may not be a firm that you have ever heard of.
When the Department of Homeland Security purposefully dropped data disks and USB flash drives in the parking lots of federal agencies and government contractors, 60 percent of the found objects were inserted into an agency or contractor network.
Recipients can now receive view-only files, which cannot be downloaded, forwarded, or copied and pasted; files can be watermarked, and not available for editing; users can search files for key words and phrases
Whether you are in a private or public enterprise, developing a solid base of intelligence on new and emerging technologies is a critical element in developing strategic and tactical responses to maintain operational continuity.
Monitoring emerging trends, customer likes and dislikes, and understanding unmet customer needs can determine how rapid a rate of incline or decline your business experiences. Companies spend millions of dollars conducting surveys of customers, potential customers, industry experts and key opinion leaders to determine if their products or services effectively meet, exceed or miss market expectations.
For the next generation of enterprise security leaders, is there a clear path forward to success? Enterprise security leaders discuss mentorships, education, certifications and the skills new CSOs and CISOs will need to succeed in their evolving roles and bring value to the business. But the problem is: with existing security leadership roles varying so widely, is the development of a uniform skill set even possible?