As security leaders gain increasing responsibility for cybersecurity, Security columnist John McClurg – Vice President and Ambassador-At-Large in Cylance’s Office of Security & Trust and former CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell
Laboratories – guides enterprise security executives through cybersecurity standards, frameworks, risks and management techniques.
IBM selected six school districts to receive its IBM Education Security Preparedness Grant, which totals $3 million. The in-kind grant was created to help United States K-12 public school districts proactively prepare for and respond to cyberattacks.
The first RSA Conference took place 30 years ago. It was conceived by the then-CEO Jim Bidzos, and consisted of roughly 50 people in a room discussing cryptography – the focus area of that first assembly. By the turn of the millennium, the conference expanded internationally, reaching audiences in Europe, China, Singapore and Abu Dhabi. Ten years later in 2011, the RSA Conference boasted an impressive 18,500 attendees in the United States alone.
The focus of cybersecurity protection shouldn’t always be about trying to anticipate the latest means or technology that could impact a business, but instead, focusing on the same tactics and how these can specifically adapt.
As employees return back to the office, challenges continue to unfold and the best way to approach many of the computers and systems that have been off company premises for so long is to regard them as potentially infected.
With technology becoming more accessible and complex, prioritizing a defense against insider threats may be the better strategy. After all, the moment an outsider breaches an organization, they become an insider.
The Cybersecurity and Geopolitical podcast covers the enmeshing of cybersecurity and geopolitics and the new challenges and intriguing flashpoints these bring to enterprise security and risk professionals. This month, we delve into the threatening and alarming world of misinformation, disinformation, and conspiracy theories.
In the tense political and economic climate, state-backed actors have used every possible means to gain leverage over their rivals. And in the midst of the chaos, every individual and organization can become a victim or collateral damage in the context of bigger conflicts. Here’s a glimpse of where we are and how organizations can protect themselves going forward.
ON DEMAND: The security ecosystem protects digital assets, physical assets, and people - the newly distributed workforce creates new and increased physical and cybersecurity risks. Situational and security awareness is a role every employee must play, and you’ll help get them there with awareness, cybersecurity hygiene and security practices that help keep company, employee and customer information safe.