Increasingly, a physical security director's role, the branch of computer security that is specifically related to the Internet, with issues involving fraud and the protection of transfer of data and a company's brand.
As security leaders gain increasing responsibility for cybersecurity, Security columnist John McClurg – Vice President and Ambassador-At-Large in Cylance’s Office of Security & Trust and former CSO at Dell; Vice President of Global Security at Honeywell International, Lucent Technologies/Bell
Laboratories – guides enterprise security executives through cybersecurity standards, frameworks, risks and management techniques.
Security magazine and its partner for the Top Cybersecurity Leaders, (ISC)², is looking for enterprise information security executives, who have made and continue to make significant contributions in the cybersecurity space to their organizations and/or the enterprise-level information security profession.
Webcor, a provider of commercial construction services throughout California needed a way to find and mitigate threats, and reduce the company’s cyber risk profile. The company implemented a managed services approach to augment its existing IT and security staff and improve its security posture.
Meet Ian Thornton-Trump. He is the Chief Information Security Officer at Cyjax, and an ITIL certified IT professional with 25 years of experience in IT security and information technology. As CISO Cyjax, Ian has deep experience with the threats facing small, medium and enterprise businesses. His research and experience have made him a sought-after cybersecurity consultant specializing in cyber threat intelligence programs for small, medium and enterprise organizations. In his spare time, he teaches cybersecurity and IT business courses for CompTIA as part of their global faculty and is the lead architect for Cyber Titan, Canada's efforts to encourage the next generation of cyber professionals.
Attorney General Kathy Jennings announced that Delaware has joined a total $17.5 million settlement against Georgia-based retailer The Home Depot, resolving a multistate investigation of a 2014 data breach which exposed the payment card information of approximately 40 million Home Depot consumers nationwide. Through the settlement The Home Depot has reached a resolution with 45 other states and the District of Columbia. The DOJ’s Consumer Protection Unit helped secure the settlement.
The year 2020 has been a whirlwind of adaptation and change, prompting the phrase “business as usual” to take on a whole new meaning. The Center for Internet Security, Inc. (CIS) has become a leader in supporting both public and private organizations in the COVID era, when many are shifting more of their workforce remote and more of their workloads to the cloud. 2020 also marks a milestone for the Center for Internet Security, as CIS is celebrating its 20th anniversary this month.
NSA’s National Cryptologic Museum (NCM) is thriving and plans to keep growing as it welcomes a new Director. Dr. Vince Houghton, who brings a deep background in intelligence and history, joined the Agency last month after serving as historian and curator of the International Spy Museum in Washington, D.C. Dr. Houghton said he already is impressed with the professionalism of the current staff.
With more commerce occurring online this year, and with the holiday season upon us, the Cybersecurity and Infrastructure Security Agency (CISA) reminds shoppers to remain vigilant. Be especially cautious of fraudulent sites spoofing reputable businesses, unsolicited emails purporting to be from charities, and unencrypted financial transactions.
Content-centric solutions that evaluate each message based on how likely it is to be bad create a gap through which identity-based email attacks can slip. A zero-trust email security model is vital to closing that gap. Zero-trust may also be characterized as zero-assumption.
For organizations experiencing data breaches, the consequences are considerable, especially for security operations. IBM reports that over 25,000 data records are stolen with the average data breach, and costing the targeted company as much as $8.64M per breach in the United States. And it takes on average a staggering 280 days between identifying and containing a data breach (known as the breach cycle). So why is it so hard to fight this digital war, and why is the breach cycle so long?
ON DEMAND: The physical security industry adopts datacenter information technology in bits and pieces, but not to the extent possible. This prevents organizations from making strides in reducing costs and complexity, rapidly responding to change, and delivering on the prime security directives of keeping people and property safe.
ON DEMAND: The security ecosystem protects digital assets, physical assets, and people - the newly distributed workforce creates new and increased physical and cybersecurity risks. Situational and security awareness is a role every employee must play, and you’ll help get them there with awareness, cybersecurity hygiene and security practices that help keep company, employee and customer information safe.
ON DEMAND: The event will look at the in-car and off-board infrastructure cybersecurity policies, technologies, services, and products that will enable top OEMs and suppliers to strengthen their products’ defenses, mitigation, and resilience.
ON DEMAND: Right now, in the pandemic environment, business leaders are balancing internal priorities – managing cost and impacts to productivity – with market and external priorities like government requirements, customer needs, and perceived standards of safety and health.
ON DEMAND: There's a lot at stake when it comes to cybersecurity. Reputation, productivity, quality. Join us to discuss the future of your global security strategy and a path forward with trusted partners Cisco and Rockwell Automation, and turn your Food & Bev security challenges into strategic advantages that drive business value.
This month, Security magazine brings you the Security 500 Report, Rankings and Thought Leader Profiles. How does your enterprise compare to others? Which security programs are leading the way? Also this month, we highlight how to plan, prepare for and build resilience to protests and other unplanned events, video surveillance tools for SMBs and more.