Chris Hallenbeck, CISO for the Americas at Tanium, has led security and IT operations, incident response, endpoint detection and built and deployed teams for incidents of national security. What initiatives has he implemented as a CISO, and how does he gauge the success of his team?
What are some simple risk management rules that will support healthcare organizations, without significantly exposing it to major security risks as they adapt to this new and challenging COVID-19 situation?
The old curse has come true: we are “living in interesting times.” None of us could have possibly foreseen the way that 2020 has evolved, least of all, conference professionals. Gartner says it’s taking a $158 million hit in its Q2 revenues; O’Reilly went one huge step further, permanently shuttering its in-person events business. Aside from those gatherings, an entire slew of security meetings has moved into the virtual realm. In-person conferences during the pandemic are seen as being too hazardous and unsafe. It's now better to meet online than to risk spreading the virus.
The best way to prevent scripting attacks, such as those that implement Python back doors or compromise PowerShell, is to implement identity-based zero trust. In a zero trust environment, IT treats the internal network as if it were the public internet, a place where nothing can be trusted, and anything can be a threat.
Laura Stepanek, Editor-in-Chief of SDM Magazine has retired. For 36 years, she was the face of SDM, and she has witnessed how new technology has changed the security industry. We wish the best for Laura in her well-deserved retirement.
Although it is unclear whether the forthcoming bill has any chance of becoming law, it is further evidence that companies need to consider the significant privacy issues and risks associated with implementing COVID-19-related technology.
On April 30, 2020, a group of four Republican Senators announced their plan to introduce federal privacy legislation that would regulate the collection and use of personal information relating to the fight against the Coronavirus pandemic. How would the proposed bill, COVID-19 Consumer Data Protection Act, attempt to solve privacy concerns?
The four individuals who were identified and indicted by the Trump Administration in relation to the Equifax breach from 2017 is yet another example of the overt collection efforts by the Chinese government to steal Americans’ sensitive personal information. The openness of the U.S. government to share these examples should help bring the reality of cyber threats to the forefront in corporate board rooms and research universities. I would like to highlight that these particular attacks were conducted for a different goal – espionage.
What challenges has COVID-19 presented to enterprise security, how did business continuity plans evolve and what lessons have enterprise security learned?
"No one knows." We keep hearing that phrase. But, it's up to security professionals, healthcare workers and public safety officers to truly inhabit many leadership titles during COVID-19.
As a result of the COVID-19 pandemic, more people than ever are working remotely. Because of this recent and rapid transition, users are accessing corporate resources from their homes and generating unprecedented amounts of network traffic. IT departments face increased pressure to ensure business continuity by providing remote users with access to essential corporate applications and services through Virtual Private Networks (VPNs), which are designed to provide access to private networks through shared or public networks.