Meet Mary Ludford, Vice President and Deputy Chief Security Officer for the Corporate and Information Security Services business unit at the Exelon Corporation.
How is Mary Ludford, Vice President and Deputy Chief Security Officer for the Corporate and Information Security Services business unit at Exelon Corporation, mitigating and managing risk on a daily basis?
Several state agencies, boards, commissions and universities are allegedly failing to adhere to state cybersecurity laws, leaving Mississippians’ personal data vulnerable to hackers.
The New Jersey Office of Homeland Security and Preparedness (NJOHSP) and the New Jersey Cybersecurity and Communications Integration Cell (NJCCIC) are promoting cybersecurity best practices throughout October alongside a coalition of private businesses, nonprofit organizations, government agencies and academic institutions.
The Cybersecurity and Infrastructure Security Agency's mission is extensive: to help secure the nation's critical infrastructure from physical and cyber threats, and to create a more secure and resilient infrastructure for the future.
Meet the Department of Homeland Security's newest agency - the Cybersecurity and Infrastructure Security Agency - that will serve as the pinnacle for national risk management for cyber and physical infrastructure.
Eighty-six percent of respondents in a survey are confident or very confident they have no gaps in their security controls deployed across devices, applications, people and data, in a Forrester Consulting Study.
The cost of data breaches will rise from $3 trillion each year to more than $5 trillion in 2024, an average annual growth of 11%, says a new report from Juniper Research.
While VR and AR have different fortes, both enhance and accelerate experiential learning that can help manifest and reinforce a culture of cybersecurity across industries. It is technology implications like this that will help propel cybersecurity awareness into a state of mass awareness.
Enterprises are struggling to find the right talent to safeguard their networks; therefore, they must change their mindsets and begin recruiting talent from non-traditional backgrounds to ensure they have the "right" person on their SOC team.