In this videocast interview, Theo Zafirakos, CISO, Terranova Security, provides expert analysis of the "Securing Your Third-Party Supply Chain in 2024 Survey" results, including a deep dive into the core conclusions, including the core detriments of poor visibility of cybersecurity awareness, and how to better...
Welcome to the report summarizing the survey, "Securing Your
Third-Party Supply Chain Through Security Awareness."
In late fall 2023, Information Security Media Group partnered with Forta's Terranova Security and surveyed over 100
senior cybersecurity professionals to identify:
The top organizational challenges in...
Joe Sullivan, CEO of Ukraine Friends, delves into the complexities of cybersecurity, drawing from his experience as the former CSO of Uber. He shares lessons learned from the high-profile Uber breach case and personal experiences to address broader issues in the cybersecurity landscape.
By the numbers, who has implemented GenAI in their organization? Who has a dedicated budget? And who understands the AI regulations for their industry? An expert panel discusses the findings of ISMG's First Annual Generative AI Study: Business Rewards vs. Security Risks.
Steve Katz, the world's first CISO, died Saturday night while under hospice care in Long Island, New York. He left a strong legacy - not just as a pioneer and trailblazer in cybersecurity leadership but also as a beloved colleague and mentor who generously shared his time and wisdom.
In the constant struggle to manage the other five pillars - identify, protect, detect, respond and recover - security leaders often do not have governance at top of mind, said Netography CEO Martin Roesch, but he added, "Good governance is the root of having good security."
Make no mistake, beyond all the hype, widespread availability of generative AI is a revolution impacting us all and fundamentally changing how we do business...let alone, communicate. In every revolution there are winners and losers, and there is no opt-out if we want to avoid being left behind by our...
Compromised mobile apps can be an open door to critical
enterprise app servers and other back-end systems,
and this survey aims to shine a light on a potential hole in
most enterprise security walls – exposing potential gaps in
Compromised mobile apps can be an open door to critical enterprise app servers and other back-end systems, and this survey aims to shine a light on a potential hole in most enterprise security walls – exposing potential gaps in CISO awareness.
In Q2 & Q3 2023, ISMG surveyed over 100 senior cybersecurity...
In this episode of CyberEd.io's podcast series "Cybersecurity Insights," former Uber CSO Joe Sullivan discusses the Uber trial and offers guidance to future CISOs. Was the Uber case a data breach or not. Sullivan explained why that making that distinction can be complicated.
Global demand for qualified cybersecurity professionals has never been greater. Research shows there’s a shortage of nearly 4 million cybersecurity workers compared to the number of roles that need to be filled.
This whitepaper will walk you through some of the common challenges newcomers to cybersecurity face...
The idea of an attack surface is not new, but how organizations and CISOs need to view their attack surfaces should be updated. Traditionally, IT has looked at an organization's attack surface from the inside out, asking questions like “What are the assets that connect to the wider internet?” and “Where is the...
As organizations grapple with an increasingly complex digital landscape, CISOs and CIOs are faced with heightened executive liability. With the high-profile cases of CIO Carlos Abarca and CSO Joe Sullivan serving as stark examples, the message is clear - executives cannot afford to be complacent.
To truly be effective, CISOs must understand their organization's focus and culture. "In understanding the organization and its language, you understand what matters, and then by extension that will drive your security strategy and your security focus," said Helen Rabe, CISO at the BBC.