Director Jared M. Maples of the New Jersey Office of Homeland Security and Preparedness (NJOHSP) discussed the impact of US Department of Homeland Security (DHS) grant programs on the ability of New Jersey communities to combat threats and prepare for emergencies when he testified before the US House of Representatives Subcommittee on Emergency Preparedness, Response, and Recovery on April 28. The hearing, “State and Local Perspectives on DHS Preparedness Grant Programs,” examined the critical role federal grants play in security and resiliency planning, especially as new tactics and events continue to alter the threat landscape in both the physical and cyber realms.
The WSJ's Cybersecurity executive forum will take place virtually on June 2, 2021. The day-long forum will give security executives insight into case studies from peers and allow them to connect directly with peers in the industry to discuss biggest challenges and best practices.
State of Cybersecurity 2021 report finds that 61% of cybersecurity teams are understaffed
May 4, 2021
The pandemic’s disruption has rippled across the globe, impacting workforces in nearly every sector. However, according to the findings from the State of Cybersecurity 2021 Part 1 survey report from ISACA in partnership with HCL Technologies, the cybersecurity workforce has largely been unscathed, though all-too familiar challenges in hiring and retention continue at levels similar to years past.
In order to remain resilient and meet the emerging priorities around effective supplier management, improved business continuity planning, and increased community engagement, business leaders need to assess and benchmark their performance around three core areas of organizational resilience: operational resilience, supply chain resilience, and information resilience.
The National Security Agency (NSA) released the Cybersecurity Advisory, “Stop Malicious Cyber Activity Against Connected Operational Technology.” The CSA details how to evaluate risks to systems and improve the security of connections between OT and enterprise networks. Information technology (IT) exploitation can serve as a pivot point for OT exploitation, so carefully evaluating the risk of connectivity between IT and OT systems is necessary to ensure unique cybersecurity requirements are met.
U.S. Customs and Border Protection and the World Business Alliance for Secure Commerce Organization (WBO) issued a joint statement affirming their shared commitment to enhance supply chain security. In the joint statement, CBP and WBO expressed their intent to collaborate on implementing a nine-point action plan that calls for, among other measures: Enhanced information sharing; Joint training and outreach on supply chain security; Customs Trade Partnership Against Terrorism (CTPAT) recognition for WBO certified supply chain partners that successfully complete a CBP validation process; and
The U.S. Federal Emergency Management Agency (FEMA) will host the Hazard Mitigation Partners Workshop on May 3, 2021 - May 6, 2021. The Hazard Mitigation Partners Workshop is the annual gathering of hazard mitigation stakeholders with the purpose of informing and updating them about mitigation grants and floodplain management, strengthening those relationships, and providing knowledge transfer between FEMA and invited attendees.
Zoom has joined the CVE Program as a CVE Numbering Authority (CNA). The CVE Program’s overall mission is to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities that require third-party notification or coordination to fully remediate. Cybersecurity and IT professionals use CVE records to ensure they are discussing the same security issue, coordinate their efforts, and prioritize and address vulnerabilities. The program is an international, community-based effort and relies on the industry norms of the responsible and coordinated security community to discover vulnerabilities.
Human error contributes to almost 95% of security breaches. Most security approaches still fail at making a desired impact. Let’s analyze the two main reasons why businesses fail to develop a robust, human-centric security approach.
The Security Executive Council (SEC) has welcomed Tom Bello, Coral Gehring, Matthew Giese, Bill King, and Tom Mahlik to its faculty of esteemed security experts. SEC subject matter experts and emeritus faculty (former CSOs and CISOs) have excelled in their careers and are eager to transfer their knowledge and competencies to other security leaders.