The Chief Information Security Officer (CISO) role has evolved greatly since its inception in 1995. Review the pros and cons of different CISO reporting models when it comes to business resilience and cybersecurity.
The first step in creating a complete data security plan is to know what types of data the company collects, where it is stored, and with whom and how it is shared. Next, the business should determine the potential risks to that data and whether the information resides in electronic or physical form (or both).
Pamela Perini, certified PSP and president of Pamela Perini Consulting, talks to Security about her journey through security and the process of risk assessment. She also touches on the importance of certification in the security industry and factors to consider when designing a security program.
Check out five tips on how to execute a successful ransomware tabletop exercise, including how to identify key participants and ensure representatives from core business and operations teams are involved.
If hackers can learn the ins and outs of your network, shouldn’t you beat them to the punch by obtaining deeper visibility and holistic mapping of your network infrastructure and attached applications, services, and devices?
Video surveillance has evolved with changing technology. Artificial intelligence-enabled surveillance presents various opportunities for public application.
Security professionals can use these four strategies to better protect themselves against third-party risk, which can lead to cyberattacks and data breaches.
Healthcare employees are more likely to experience workplace violence (WPV) than any other profession. Five articles support the theory that simulators and coaching reduce workplace violence prevention through hands-on training that provides the workforce with the knowledge, awareness, skills and confidence to manage situations.