At a time of sweeping change in cybersecurity, attorney Stephen Wu says organizations need to be prepared from a compliance, incident response and risk management perspective to address novel situations stretching society's capabilities.
Despite active attacks against the vast infrastructure that was created to support the 2012 Olympics, the games proceeded without a hitch. But making that happens required unprecedented levels of cross-vendor collaboration, says BT's Jason Cook.
This year's event was bigger than ever, overwhelming to take in, and no single challenge, strategy or solution emerged as a top priority - very much a reflection of today's information security marketplace.
Organizations are at greater security risk than ever, but they also continue to struggle to obtain adequate security staff. Robert Stroud of ISACA offers new recommendations to address the staffing shortage.
There may be no single theme at RSA Conference 2015, but cyberinsurance is a recurring hot topic. ISMG's executive editors share their insights and highlights from the San Francisco security event.
As a longtime security leader, Eddie Schwartz has felt acutely the pain of the security skills crisis. Now, as chair of ISACA's Cybersecurity Task Force, he's helping organizations do something about it.
In conducting due diligence, investors spend more time than ever assessing the cyber-risk posed by the company targeted for acquisition, says Jacob Olcott, VP for business development at Bitsight Technologies.
Everyone is talking about threat intelligence. But what are they actually doing to create actionable intel to improve their security posture? Chris Richter of Level 3 offers insight and strategies.
In his new role at a new company, security veteran Sam Curry is both CSO and CTO at Arbor Networks. What are the unique challenges, as well as the opportunities to improve how organizations protect their digital assets?
Neustar has just released its State of DDoS report. What are the highlights? Margee Abrams of Neustar offers insights into the key findings and how organizations are successfully defending against attacks.
No longer just a second fiddle to security, privacy has emerged as a global hot topic - and a growing career option. Michelle Dennedy of Intel Security talks about what it takes to make a career in privacy.
Andy Ellis, chief security officer of Akamai Technologies, says that in today's burgeoning information security talent marketplace, as a hiring manager the quality he hires above all is passion.
Emerging technologies open new doorways for insiders to commit fraud. Insider threat expert Randy Trzeciak talks about the latest tools and techniques to spot rogue insiders before they steal the digital goods.
Security is often seen as 'the department of no,' and that image must change. Amit Chatterjee of CA Technologies prescribes a new approach to enterprise security and how security leaders can step up to it.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.