This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
They earned certifications, developed practitioner-level skills in zero trust, and were given the opportunity to get advice and inspiration from cybersecurity professionals in Zscaler’s Career Development forum on Zenith Community —all at no cost. Brian even shared code that the students could use to practice their skills.
Data protection in the AI era Recently, I attended the annual member conference of the ACSC , a non-profit organization focused on improving cybersecurity defense for enterprises, universities, government agencies, and other organizations. These will start with existing controls and be augmented with new AI-specific ones.
Offering five full days of educational training from experienced industry practitioners, the RSA Conference is widely regarded as one of the world''s leading forums for enterprises and technical informationsecurity professionals. This year, the Conference will be held April 20-24 at San Francisco''s Moscone Center.
Recognized as a pioneer in the field of classified information protection, Mr. Bigman developed technical measures and procedures to manage the nation’s most sensitive secrets. He then developed creative solutions to allow the CIA to use the Internet to further its mission without exposure. Dr. Richard Marshall, Esq.,
The dominant theme of this year’s 2022 Security Exhibition & Conference (17-19 August) is the importance of having an innovative, technologically advanced and competitive industry that will meet the challenges of a new era in security. Security is still the art of following best practices.
To apply to sit for a CCB examination, all candidates are required to earn and submit 20 CCB-approved continuing education units, earned from live trainings, events, and web conferences. The certification covers informationsecurity governance, informationsecurity risk management, informationsecurity programs, and incident management.
Frost's presentation on "Threats to National Security in Cyberspace" had a packed crowd at attention as she talked about known hacking groups, their methods, motivations, and relationship to greater geopolitical developments—including what's happening in Russia, Ukraine, and China.
McClurg is among the speakers at The Canadian CSO Future of InformationSecurity Summit , taking place virtually May 18 and 19. Gathering security executives from a variety of industries across Canada, the summit will focus on mitigating risk and building market trust.
Man-in-the-middle attackers can abuse the WPAD protocol to hijack people's online accounts and steal their sensitive information even when they access websites over encrypted HTTPS or VPN connections, said Alex Chapman and Paul Stone, researchers with U.K.-based
At SecureWorld, we consider all of our Advisory Council members—the CISOs, BISOs, and senior leaders who help us plan each of our 15 in-person conferences—to be true cyber heroes. So, it's fitting that the theme for our 2024 conferences is "Legacies Untold: Revealing Cybersecurity's Hidden Figures."
Microsoft, under intense pressure to better protect its systems and customers from cyberattacks, will answer that question by giving its top security execs a prime spot on stage Tuesday morning at its annual Ignite conference for IT pros in Chicago. The next month, Nadella declared that it was. So they are moving very graphically.”
According to the 2023 State of the CIO , IT leaders are looking to shore up competencies in key areas such as cybersecurity (39%), application development (30%), data science/analytics (30%), and AI/machine learning (26%). From an individual’s perspective, it keeps careers interesting and helps people grow with the organization.
Sponsored Lunch Talk: Dave Uhler, director of research & development at Slalom. Fireside Chat: Chris Young, executive vice president of business development, strategy and ventures at Microsoft. GeekWire Photo / Kevin Lisota). Power Talk: Neil King, professor at The University of Washington’s Institute for Protein Design.
They earned certifications, developed practitioner-level skills in zero trust, and were given the opportunity to get advice and inspiration from cybersecurity professionals in Zscaler’s Career Development forum on Zenith Community —all at no cost. Brian even shared code that the students could use to practice their skills.
At the RSA Conference in February 2014, the company announced threat intelligence partnerships with ThreatGRID and Reversing Labs. “A A security strategy that only reacts to attacks isn’t acceptable,” said Paul Calatayud, Chief InformationSecurity Officer of Surescripts. “To
SecureWorld PLUS courses are back for Spring 2025, offering an incredible opportunity for hands-on, expert-led training at all eight of our regional conferences. Lesson 2: AI Security Threats Discover how threat actors use AI to automate attack lifecycles, from reconnaissance to exploitation. See our Events schedule here.
See more and register at the links below: Texas virtual conference on Thursday, Nov. West Coast virtual conference on Thursday, Dec. Don't miss Kathleen Moriarty's complete presentation, as well as those of other cybersecurity leaders, at our upcoming digital events. Attendance is free and can earn 5 CPE credits.
Walter Williams has more than 20 years of experience in InformationSecurity, and currently resides as the CISO for Monotype. He is the author of "Creating an InformationSecurity Program from Scratch" (2021, CRC Press) and "Security for Service Oriented Architecture" (2014, CRC Press). A : Challenging.
The good news for CIOs wanting to enable domain experts to develop their own apps to solve business problems is that there’s a vast array of low-code development platforms to choose from. Any time you try to standardize on a single platform for development, you’re going to deal with tradeoffs,” Gartner’s Gaughan said.
Andrew Wilder is the Vice President and Chief InformationSecurity Officer (CISO) at Hillenbrand. In addition to being a CISO, Andrew is a Board Member and Adjunct Professor at Washington University's InformationSecurity Executive Education Program. See the conference agenda and register here.
He has been in the informationsecurity and technology field for the past 20 years working in education, financial, telecommunication, healthcare, and insurance sectors. Fred serves on the Advisory Council for SecureWorld Chicago and will be presenting at our upcoming conference on June 6, 2024. A: Networking with my peers.
Chris Spohr is the InformationSecurity Officer for Republic Finance, LLC, and adds value by serving as the Head of InformationSecurity to protect the company's data, brand, and jobs. Louis, attend the SecureWorld regional conference on September 15, 2022. See the conference agenda and register here.
Make sure your vendor has staff that maintains good standing and solid peer relationships in the security and cyber-intelligence communities. Make sure your vendor continues to innovate and has a product and development roadmap that supports your needs and growth goals. How does the vendor plan to address your business in a year?
Cybersecurity provides an opportunity to serve a great mission (protecting the company or greater good) and fosters the opportunity for continuous learn and development. Also, watching my mentees develop and grow. A : InformationSecurity. See the conference agenda and register here. is required.
Finney, Chief InformationSecurity Officer at Southern Methodist University, SecureWorld Advisory Councilmember, and keynote speaker at this year's virtual Texas conference, developed a technique to help users discern between safe emails and phishing messages. A new strategy for p hishing email detection. His new book.
"The results indicate a marked change since a Thycotic study as recently as 2019 found that many security professionals believe they've got an image problem, with roughly two-thirds believing their teams are regarded as the company naysayers—either 'doom mongers' or a 'necessary evil.'. Why are opinions of cybersecurity professionals surging?
Reanna Schulz is Team Leader of InformationSecurity at Garmin, directly reporting out of their Security Operations Center (SOC). She serves on the Advisory Council for SecureWorld Kansas City and has presented at a few of our conferences this year. Despite my skepticism, I enrolled in the course.
NIST's Chief of the Applied Cybersecurity Division spoke about the goals of the 2022 NIST CSF update at a recent conference. NIST will for the informationsecurity community's input in early 2022 and we'll let you know when that happens. The answer: it was developed for critical infrastructure.
From R&D, configuration management, network engineering, systems engineering, leading teams, and management, moving naturally through those realms as they developed and progressed into cybersecurity as it is now known. Louis, attend the SecureWorld regional conference on September 15, 2022. A : Volatile.
Block Chain Developer 6. Blockchain Developer: Blockchain is a disruptive technology that has created new development roles in the last five years or so. That's why cybersecurity professionals are constantly reading, attending conferences like SecureWorld, and learning about the latest threats and risk remediation techniques."
After spending 25 years of her career in IT, including more than 17 years in informationsecurity, Nancy considers joining the Federal Reserve Bank in 2017 as the highlight of her career. At Comcast as a DevSecOps Transformation Coach, she fosters continuous improvement and sustained adoption of SecureDevelopment Lifecycle practices.
Gene Kingsley has worked as a dedicated resource in the InformationSecurity space for more than 25 years, among industries such as Higher Ed, Healthcare, Finance, Federal Government agencies, and others. After that, I became a help desk manager for a local college and worked my way up to Director of InformationSecurity.
Ben Goodman is Senior Vice President of Global Business Development at ForgeRock, a digital identity and access management company. But over time, we have to come back and make sure we are upgrading that infrastructure, and we have to make sure that we're doing things securely.". The web conference is available to watch on-demand.
In an effort to get more cybersecurity professionals into government roles, the Department of Homeland Security (DHS) announced its Cybersecurity Talent Management System (CTMS), which will allow DHS to recruit top cybersecurity talent—and pay them much more. And the FBI reported that ransomware payments totaled over $400 million.
As organizations across industries grapple with escalating cyber risks, the demand for skilled informationsecurity professionals has skyrocketed. Professional development and learning: Pursuing a cybersecurity certification involves a commitment to continuous learning and professional development.
Beyond formal hierarchies, you'll need to develop a keen sense of the unwritten rules, the communication patterns, and the interpersonal dynamics. Observe how employees interact, the informal communication channels, and the protocols that govern workplace interactions. And they're right. But is the culture the right one for you?
If you don’t know what these conferences are, just ask the people that keep your company secure from a security breach. For more than 20 years, Black Hat has provided attendees with the very latest in informationsecurity research, development, and trends.
If you don’t know what these conferences are, just ask the people that keep your company secure from a security breach. For more than 20 years, Black Hat has provided attendees with the very latest in informationsecurity research, development, and trends.
"The f act that we acknowledge real risks of AI is the potential for business decisions to be made from data coming out of it that could have significant bias or inaccuracies," said Rick Doten, VP of InformationSecurity at Centene Corporation. NIST post from Feb. See the agenda and register for free here.
Boyle is teaching PLUS Courses on the NIST CSF at all six in-person regional SecureWorld conferences this fall , including Denver on Sept. Defending and Investigating Advanced Intrusions on Secure Email Gateways" at SecureWorld Dallas on Oct. 8 (day 1 of the 2-day conference). 19, Detroit on Sept. Louis on Oct.
When David Sherry became Chief InformationSecurity Officer at Princeton University, he says cybersecurity was done well. "I I don't want you to think security at Princeton was some sort of vast wasteland. The first thing he did was assemble a team, and that team bought into and helped develop the vision.
Cybersecurity and Infrastructure Security Agency (CISA) announced discovery of Zero-Day exploits being used to attack Microsoft Exchange email servers. Hafnium, a group believed to be Chinese nation-state hackers, developed or discovered a previously unknown way to secretly access email servers around the globe.
As defenders of digital assets, Chief InformationSecurity Officers (CISOs) and cybersecurity professionals face immense pressure, often leading to burnout. Provide Continuous Learning Opportunities Offer training and development programs to help professionals keep up with evolving threats without feeling overwhelmed.
We organize all of the trending information in your field so you don't have to. Join 83,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content