The National Center for Spectator Sports Safety and Security (NCS4) will host the 2020 National Sports Safety and Security Conference virtually October 12-14, 2020. Read on to learn about the speakers and panels.
To help you and your organization plan and implement an improved cyber hygiene program, we now present a framework for full IoT device defensibility in real world deployments at scale. This framework represents current state-of-the-art best practices for protecting IoT devices, and can form the backbone of your assessment, evaluation, and improvement plans. Follow the steps below to strengthen your network defenses.
Security veteran Matthieu Petrigh launched a new website with training programs on an array of topics dedicated to security professionals and those interested in learning security the he hopes will help others in the industry progress their careers.
Now more than ever, government policy makers need to focus resources; allowing law enforcement to focus on the core duties and responsibilities of law enforcement officers. And industries like ours, need to be creative in developing solutions to support them in this effort. The physical security industry supports law enforcement and when private security works in partnership with law enforcement, police officers have more time to focus on preventing and solving crimes.
The SEC’s Office of Compliance Inspections and Examinations (“OCIE”) recently issued a Risk Alert (the “Alert”) discussing cybersecurity observations from its examinations over time. The Alert did not state the time period of examinations included; however, OCIE has conducted several cybersecurity targeted exams over recent years.
We spoke to John Scimone, Dell’s Chief Security Officer, who runs a converged organization, combining physical and cybersecurity, about how he has personally navigated a culture of convergence and digital transformation at Dell.
To get buy in from the entire organization on your role as a security professional, share these basic elements of an effective cybersecurity strategy with the rest of the C-suite.
Government organization Enterprise Ireland put on a cybersecurity panel discussion yesterday tackling a wide range of subjects as it relates to cybersecurity, private and public sector roles and responsibilities, and even managing cybersecurity for organizations with a huge global reach operating in multiple countries.
Why are CISOs constrained from delivering metrics at scale and why is producing good security metrics so difficult? Here, find out what the five stages of security metrics maturity are, and how you can achieve a mature security metrics program.