In order to remain resilient and meet the emerging priorities around effective supplier management, improved business continuity planning, and increased community engagement, business leaders need to assess and benchmark their performance around three core areas of organizational resilience: operational resilience, supply chain resilience, and information resilience.
The National Security Agency (NSA) released the Cybersecurity Advisory, “Stop Malicious Cyber Activity Against Connected Operational Technology.” The CSA details how to evaluate risks to systems and improve the security of connections between OT and enterprise networks. Information technology (IT) exploitation can serve as a pivot point for OT exploitation, so carefully evaluating the risk of connectivity between IT and OT systems is necessary to ensure unique cybersecurity requirements are met.
U.S. Customs and Border Protection and the World Business Alliance for Secure Commerce Organization (WBO) issued a joint statement affirming their shared commitment to enhance supply chain security. In the joint statement, CBP and WBO expressed their intent to collaborate on implementing a nine-point action plan that calls for, among other measures: Enhanced information sharing; Joint training and outreach on supply chain security; Customs Trade Partnership Against Terrorism (CTPAT) recognition for WBO certified supply chain partners that successfully complete a CBP validation process; and
Paul Suarez joins Casey's General Stores in the newly created Chief Information Security Officer position at the company, which operates 2,200 convenience stores across 16 states.
The U.S. Federal Emergency Management Agency (FEMA) will host the Hazard Mitigation Partners Workshop on May 3, 2021 - May 6, 2021. The Hazard Mitigation Partners Workshop is the annual gathering of hazard mitigation stakeholders with the purpose of informing and updating them about mitigation grants and floodplain management, strengthening those relationships, and providing knowledge transfer between FEMA and invited attendees.
Human error contributes to almost 95% of security breaches. Most security approaches still fail at making a desired impact. Let’s analyze the two main reasons why businesses fail to develop a robust, human-centric security approach.
The Security Executive Council (SEC) has welcomed Tom Bello, Coral Gehring, Matthew Giese, Bill King, and Tom Mahlik to its faculty of esteemed security experts. SEC subject matter experts and emeritus faculty (former CSOs and CISOs) have excelled in their careers and are eager to transfer their knowledge and competencies to other security leaders.
More than 60 experts from industry, government, law enforcement, civil society and international organizations have worked together to develop a comprehensive framework, breaking down siloed approaches and advocated for a unified, aggressive, comprehensive, public-private anti-ransomware campaign.
The 81-page report, "A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force," includes 48 recommendations that together form a comprehensive framework to address ransomware. The report was delivered to the Biden administration this week. Among those, these priority recommendations are the most foundational and urgent, and many of the other recommendations were developed to facilitate or strengthen these core actions.
Experian fixed a weakness with a partner website that let anyone look up the credit score of tens of millions of Americans just by supplying their name and mailing address, KrebsOnSecurity has learned. Experian says it has plugged the data leak, but the researcher who reported the finding says he fears the same weakness may be present at countless other lending websites that work with the credit bureau.
Click Studios has advised customers to stay vigilant and ensure the validity of any email sent to them, as a bad actor has commenced a phishing attack with a "small number of customers having received emails requesting urgent action."