Remove Events Remove Information Security Remove Social
article thumbnail

4 methods to help CIOs manage cyber stress

CIO Business Intelligence

Seeing that hackers don’t work 9 to 5, IT and information security professionals generally don’t get enough rest, says Itumeleng Makgati, group information security executive at Standard Bank. This can take the form of hosting team events, meet-ups or just enabling staff to take personal time off during down cycles. “I

article thumbnail

Critical Actions Post Data Breach

SecureWorld News

ISO 22317: Focuses on Business Impact Analysis (BIA), detailing the processes for identifying and evaluating the impact of different events on business operations. How to prepare a data breach response plan After containing the data breach, the next step is to secure and analyze all available evidence to understand the incident thoroughly.

Data 112
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Examining Africa’s imperative to strengthen cyber defences

CIO Business Intelligence

Also speaking at the event, Jonas Bogoshi, CEO of ICT company BCX, noted that this trend is a big concern. According to him, 0% of appointments on large boards in South Africa have any cyber security experience, while only about 8% have some understanding of social networks and digital technologies.

article thumbnail

Stand By For Reporting From the Intelligence and National Security Summit 18-19 Sep 2014 #Intelligence2014

CTOvision

For the next two days in DC over 1000 key leaders from the national security community will be converging in a dynamic examination of intelligence and national security issues at the Intelligence and National Security Summit. Managing Director Security. Chief Information Security Officer. Should it be?

article thumbnail

Selling the C-suite on preemptive IT investments

CIO Business Intelligence

Others include preparation for zero-day attacks, almost anything having to do with data stewardship, as well as IT training and social engineering audits. Budgeting, Business Continuity, Data and Information Security, Disaster Recovery, IT Leadership, IT Strategy

article thumbnail

Twitter Ups Security for Shared Accounts

CTOvision

Instantly connecting with thousands or even millions of followers – providing up-to-the-minute information about sales, promotions, activities, or special events – presents a world of opportunity for those in the public eye. Mobile News Social Media Twitter'

Security 150
article thumbnail

Moving beyond usernames and passwords

CIO Business Intelligence

In the T-Mobile case, Lapsus$ members hacked into T-Mobile’s network in March 2022 by compromising employee accounts, either via phishing or another form of social engineering. Another recent breach took advantage of a company’s sales team via social engineering. Cyberattacks, Data and Information Security, Risk Management