Thinking of building your own Global Security Operations Center? Learn from four leading enterprises about how they developed or modified their GSOCs to bring the most value to their enterprises. Also in this issue: how to attract better cybersecurity talent, healthcare data compliance, working with integrators to test security technology, the 2017 ISC West Product Preview and much more!
GSOC, SOC, VSOC, JSOC, NOC, INSOC... The possibilities are endless when it comes to a center, building, or facility that mitigates and responds to enterprise security issues, either within the U.S. or on a global level.
Whether you’re attending ISC West on your own or with your integrator, or just watching the new security technology arrive from afar, there are many new solutions on the horizon for video surveillance, access management, mobile credentials and much more.
Whether you’re establishing your firm’s first Global Security Operations Center (GSOC), including a co-located Network Security Operations Center (NSOC) or refreshing your current GSOC’s and/or NSOC’s capabilities, here are my recommendations for success.
An inexplicable rise in organized retail crime during the past couple of years, perhaps due to police passivity, has major retailers looking to upgrade their equipment, technology, policies and procedures, and training for employees to combat loss prevention.
With so many security solutions on the market today, it can be tempting to chase the brightest new technologies to improve security operations in your enterprise.
Improving employees’ cybersecurity awareness often hinges on communicating those initiatives into risks they understand.
March 1, 2017
There’s a C- on your report card, but you’re not alone: The 2017 Global Cybersecurity Assurance Report Card found that the world’s information security practitioners gave global cybersecurity readiness an overall score of 70 percent – a six-point drop over 2016.
Today’s center of gravity in cybersecurity is shifting, pulling the skills and experience of cyber defenders in new directions. In most companies, this situation has led to a convergence of responsibilities between physical security, information security and cybersecurity teams, and an increased commitment to “staffing-up” of dedicated “cyber defenders.”
More than 5,000 vascular or thoracic patients seen between 2012 and 2015 at Sentara hospitals in Virginia. That’s what Norfolk, Virginia-based Sentara Healthcare discovered in November of 2016 within one of its third-party vendors.
To borrow from the Nobel Prize winning songwriter, the (security) times, they are a-changin’. Growing complexity is one of today’s IT’s biggest security challenges.
Cities big and small are making their way into the smart realm, putting sensors on everything from street lights to sensors, buildings to connected cars, and thus, making themselves “smart.”
Mike Tyson notably said, “Everyone has a plan ‘till they get punched in the mouth.” So, how do you ensure the same doesn’t hold true for your company’s incident response plan when a real breach occurs? Enter the NIST Framework category titled Mitigation.
Analyzing the background of security leaders across the corporate security and risk management landscape, it is not surprising to see that a significant percentage of them have come from the public sector.
There have been volumes written about the role of the CSO and how to gain a seat at the table in the C-suite. A relatively small number of CSOs have been able to convince their management that the CISO should be under their purview, citing the inherent mission conflicts that exist when the CISO reports to the CIO.
Catastrophic fires that result in property damage costing at the least $10 million, otherwise known as large-loss fires, are a growing concern due to inefficient fire protection systems and climate change.
Combatting drug trafficking at ports, screening passengers at airports, determining the age of immigrants who have lost their passports: these are among the areas where radiation is used for human imaging for non-medical purposes.
Highlighting the challenges brought on by and the need to address violent extremism and radicalization in prisons, the United Nations has unveiled a new manual that offers practical advice on managing violent extremist prisoners, disengaging them from violence and facilitating their social reintegration upon release.
Australia has launched a project that it hopes by 2020 will see 90 percent of air and sea travelers pass through passport control without the need for human passport control staff.
The threats posed by transnational criminal networks exploiting digital currencies for money laundering and terrorism financing are high on INTERPOL’s agenda in 2017.
Employee stress rates are reportedly high in companies within the United States and Canada, thus raising concerns regarding mental health, substance abuse and how a high stress environment impacts the workplace.
Ransomware is one of the most threatening malwares in the cyber industry, according to Carbonite’s Rise of Ransomware report, where 66 percent of IT professionals emphasize the seriousness of the issue, yet only 13 percent believe that they are prepared enough to prevent a ransomware attack.