This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Michael Daniel, President & CEO at Cyber Threat Alliance, discusses sharing threat intelligence with other organizations as well as the challenges faced when establishing effective partnerships in the security industry.
Learn more about the “The Modern CSO: Shaping & Learning From the Next Generation of Security Leaders” panel to be held at the 2023 SECURITY 500 conference.
In a panel discussion, security leaders will share how teams have responded to risks associated with simultaneous and prolonged geopolitical tensions and global crises.
Large language models and generative AI, such as ChatGPT, can be helpful tools but can also open organizations up to unintended risks if used improperly.
In this edition of Security’s Top 5 from Security magazine, we showcase the top stories and new developments from across the security industry throughout September.
Join more than 2,000 security practitioners, corporate decisions-makers, and law enforcement personnel from Maine to Alabama for the 22nd NYC Security Conference and Expo. Read More
ON DEMAND: Georgetown University, a major international research university with nine schools, an affiliated hospital, and many highly-ranked academic programs, has a mature, layered security program.
ON DEMAND: How are you measuring the effectiveness of your security program? Whether you’re a security leader conducting routine internal reviews or an external stakeholder conducting an assessment of a program, it is important to always keep in mind that the scope and functions of a program are largely dependent on the priorities and needs of the business it is supporting.