Remove Information Security Remove Programming Remove Sports
article thumbnail

The CISO role in cybersecurity: Solo or team sport?

Cloud Musings

The average length of time in the commercial sector between a network security breach and when the detection of that breach is more than 240 days , according to Gregory Touhill , deputy assistant secretary of Cybersecurity Operations and Programs for the Department of Homeland Security. Could your company survive?

Sports 70
article thumbnail

The Rise of Data Sovereignty and a Privacy Era

SecureWorld News

The TRIAD Model During my career as a CISO, I relied on my TRIAD Model to envision, enact, and mobilize Information Security & Privacy strategic planning and roadmap execution activities with foundational pillars as illustrated below. I – Identity A cornerstone of a strong security and privacy program. is essential.

Data 95
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

SecureWorld Returns to Houston with Energy and Enthusiasm

SecureWorld News

RELATED: Here's an article from The National CIO Review on "The Organizational Importance of the Chief Information Security Officer." They go through data analytics, a business application, digital applications, etc. ," Al Lindseth, Principal, CI5O Advisory Services LLC "Cybersecurity Really Is a Team Sport," Shawn E.

Energy 81
article thumbnail

Charlotte Conference Kicks Off Season with Thought Leaders' Expertise

SecureWorld News

McCloskey's lunch topic of " CISA Services for Cybersecurity Resilience " was chock full of links to resources that security leaders of any organization could and should take advantage of. She also spoke to the broader consequences of staff shortages and how this may affect the global cybersecurity workforce gap.

article thumbnail

Spotlight on Cybersecurity Leaders: Reanna Schultz

SecureWorld News

Reanna Schulz is Team Leader of Information Security at Garmin, directly reporting out of their Security Operations Center (SOC). During that period, I took a technology elective course in Python programming. The challenges of programming intrigued me, so I switched my major to Computer Science.

article thumbnail

The chaotic and cinematic MGM casino hack, explained

Vox

MGM, which owns more than two dozen hotel and casino locations around the world as well as an online sports betting arm, reported on Monday that a “cybersecurity issue” was affecting some of its systems, which it shut down to “protect our systems and data.” Ransomware attacks aren’t unusual these days.

article thumbnail

Spooky, Scary Tales of Vendor Management

SecureWorld News

With over 59% of all data breaches being traced back to a third-party vendor or supplier, companies need to be laser focused on their vendor management programs. Step 1: Audit your existing supplier management program. Step 2: Create/update the supplier management program. Discipline is key and not only for sports teams.