The security industry is changing, as is the profile of a successful security executive. Maintaining the status quo is no longer an option, and ignorance of risks is no longer an excuse for not mitigating them. This topic in Security features game-changing security directors or industry leaders in different sectors. So who is breaking new ground in the security industry, making great strides forward in risk management while better supporting the enterprise as a whole? If you know someone (or are someone) who fits this bill – let us know! Send your recommendations and suggestions for future Profiles in Excellence to Security Associate Editor Maria Henriquez at email@example.com.
The Unofficial Law of Endpoint Security Proportionality: The security measures taken to protect an employee’s endpoint are proportionate to the proximity of the employee to the company’s most valued assets. Or, put in simpler terms, the more closely an employee works with a company’s crown jewels, the more essential it is to virtually eliminate the possibility of an endpoint security breach.
In order to combat cybersecurity threats, the Biden administration and state governors across the country should immediately work to foster deeper relationships with the private sector. Tech and government certainly don’t always get along, but the threats we face now require a national effort that would rival the Space Race of the 1960s. This can be done through state and federal governments offering financial incentives to businesses that prioritize the development and integration of cybersecurity measures, amplified communication from the government concerning the importance of cybersecurity, as well as the potential bolstering of compliance standards to minimize threats and the negative impact of breaches.
In a paper released recently, “An integrated cyber approach to your cloud migration strategy,” Deloitte explores how an integrated cloud-cyber strategy enables organizations to use cyber as a differentiator, and outlines how cybersecurity teams must adapt.
The year 2020 presented society and the campus community with very difficult and unique challenges. Let’s take a look at a practical, fiscally responsible approach that security leaders can implement to maintain traditional services and respond to unique challenges, all while preparing for the unexpected.
Campus police and security teams are tasked with not only providing a professional and measured response to volatile and politically charged issues, but must still maintain traditional, expected and valuable services, all within budgets that, for many campus security teams, will probably not be increasing. Let’s take a look at practical security practices campus safety leaders can implement.
The use of artificial intelligence (AI) in cybersecurity, while often overhyped, is not a new concept. Hackers have included countermeasures in malware since its inception to detect runtime environments or sense detection attempts. Early actions were primitive compared to what we know today, but they laid the groundwork for more critical thought about adaptive and evasive technologies and sophisticated situational awareness. This lethal combination of research and deep targeting is likely the future of malware as adversaries attempt to outsmart the companies and researchers trying to thwart them.
With the inception of privacy regulatory laws and associated penalties, it has become mandatory for organizations to take necessary steps in establishing and implementing a strong privacy risk management framework. Inadequate, or the lack of, a risk management framework may present numerous organizational risks.
Education is particularly attractive to criminals because of the vast amount of valuable data it holds: student and staff information, supplier information, alumni databases, and research data - so, as security experts, what’s to be done to help schools secure their endpoint devices?
Now more than ever before, the small business sector is beginning to prioritize cybersecurity and cyber liability insurance to mitigate potential crippling financial risk, which is setting the stage for a major trend moving forward: the merging of cybersecurity technology and insurance to mitigate insurer’s risk and provide the best overall coverage for small businesses.
Ransomware – a cyberattack in which attackers hijack computer systems and demand payment to release them – has skyrocketed from a relative rarity a few years ago to the single biggest type of cybercrime today. And there is no end in sight to its growth trajectory. Last year, 2,354 American government entities, healthcare organizations and schools were the victims of ransomware attacks. The average ransomware payout swelled to $178,000 in the first half of 2020, up from $112,000 a year ago, according to ransomware incident response firm Coveware, and few clandestine culprits were caught.
ON DEMAND: Join our subject matter experts as they explore how the right systems can help identify, analyze and report potential incidents and help building owners sustain compliance and create safer spaces.
ON DEMAND: This webinar will guide you through how VMS can optimize your security operations at the enterprise level and examine how Valerus, Vicon’s ONVIF-compliant, full-featured solution can improve security response times via AI-driven analytics as well as expedite forensic searches and investigations.
On Demand: This interactive crisis sim webinar is inspired by the real-life events of SUNBURST. In this scenario, you’ll focus on making decisions that balance the risks to your organization based on available facts.
How can you advance your career in the security industry with the skills and competencies necessary to benefit your organization? What will the security executive and the security function of the future look like? Join us as we hear from veterans in the security industry about their experiences, their lessons learned, and best practices for advancing their careers. Read More
The latest news and information
Content written for business-minded executives who manage enterprise risk and security