Relying on outdated fraud prevention and identification measures will no longer cut it, and businesses that don’t adapt will lag. As people continue to work, collaborate and socialize via their mobile devices, businesses must equip themselves with technology and tools that will prioritize fraud prevention. If not, companies risk losing their customers to those who have invested in more robust solutions.
Steven Antoine, Chief Security Officer (CSO) at Yum! Brands, Inc. and a Security Editorial Advisory Board member received the Leadership Award for the 2020 Critical Event Management Impact Awards.
Commander Shawn Ellies was appointed Director of Security and Emergency Management at the University of Pittsburgh. He has served at the University for the past 23 years in public safety roles.
As we have done in previous years, the Security magazine team compiled our favorite articles from this year. As we head into 2021, we hope you take a moment to review some of 2020’s top articles about lessons learned, thought leadership, security challenges and good practices.
The rise of high-profile data breaches and the implementation of data privacy laws have raised awareness that businesses and institutions rely on consumer information. While there is no single, comprehensive U.S. federal data privacy law, there are enough industry-specific compliance regulations in force in addition to HIPAA, the Fair Credit Reporting Act, the Gramm-Leach-Bliley Act, the Children's Online Privacy Protection Act, and a growing number of state privacy laws, that every organization needs to step up and recognize how subject rights requests fit into its data protection and cybersecurity policies.
As companies think about how to navigate this new landscape of privacy laws and cybersecurity threats, here are a few major trends and predictions to consider:
Five Star Bank, subsidiary of Financial Institutions Inc., announced that Adolph Barclift has joined the organization as Chief Information Security Officer (CISO).
Meet Issak Davidovich, Vice President of Research and Development at C2A Security. According to Davidovich, the implementation of driver assistance technologies and cybersecurity goes hand-in-hand, and the auto industry is taking its first steps on creating in-vehicle security standards. Here, we talk to him about what this means for automotive cybersecurity.
The talent war is real, the strength in numbers favors our opponent, we now have the original digital transformations we were planning pre-COVID, and now we have additional transformations that we have to take on to enable a distributed workforce that was previously never a consideration. There simply are not enough properly equipped resources to meet global demand, and even then, an organization is only as strong as its weakest analyst. The adversary knows that and, leverages the vulnerabilities in human behavior to advance their position in the “infinite game” of cyber warfare.