What challenges has COVID-19 presented to enterprise security, how did business continuity plans evolve and what lessons have enterprise security learned?
The Information Security Forum (ISF), a London-based authority on cybersecurity, information security and risk management has released Threat Horizon 2022, which highlights nine major threats, broken down into three themes, that organizations can expect to face over the next two years as a result of increasing developments in technology.
CEOs cite cybersecurity as the biggest threat to the world economy and as a result, the global spend in cybersecurity is expected to surpass $1 trillion by 2021. An enterprise cyber attack can turn into a catastrophe in a matter of hours, potentially damaging any business at any point in time. As we see from the past few years, the greatest have already fallen.
The Government Accountability Office (GAO) has released a new report, noting that the Department of Defense (DOD) has not fully implemented three of its key initiatives and practices aimed at improving cybersecurity hygiene and is at risk of cyberattacks.
Meet the global security team at Boston Scientific – five female professionals with diverse background and skills who are ensuring the safety and security of a global enterprise.
Chief Security Officers (CSOs) are charged with protecting an organization’s assets and people. Like all corporate functions, the design of this department will vary greatly depending upon the organization. However, the process by which a program is designed, measured and evaluated has some consistent principles across different industries. This series explores how to make your physical security program more strategic, and how to secure funding for this objective.
The Trump Administration launched the Federal School Safety Clearinghouse website: SchoolSafety.gov, which has resources for K-12 administrators, educators, parents, and law enforcement to address threats related to safety, security and support in schools.
What is a Defense-in-Depth strategy, and why has it come to be acknowledged as Expense-in-Depth? How can CISO's communicate the business value of this strategy?