As we think about adapting our cybersecurity training to be more realistic, applicable, and effective, what are some things you should definitely keep and what are some things you should lose in your current security training?
Global survey of business leaders reveals pandemic-associated risks are currently top-of-mind, while technology disruptions and the future of work are concerns for the next decade
February 3, 2021
Board members and C-suite executives around the globe are most concerned in 2021 with risks associated with COVID-19-related government policies and regulations, economic conditions that may restrict growth and market conditions that may continue to impact customer demand, according to a new survey from Protiviti and North Carolina State University. Amid these near-term headwinds, when asked about top concerns through 2030, business leaders cite challenges that ultimately ladder up to talent. High ranking risks – including the adoption of technology that requires new or upgraded skills, rapid innovation that threatens business models and the reimagining of creative strategies – point to a need to attract and retain top talent and invest in reskilling and upskilling workforces to ensure agility and resilience in the future.
Approximately a year after the COVID-19 pandemic pushed organizations around the world to remote and hybrid work, this new way of working will be a mainstay for professional life in some form. Learn how security leaders are navigating their jobs remotely as they pivot to protect facilities, assets, employees and data.
With the shift to remote work increased due to the COVID-19 pandemic, security teams working remotely poses its own set of challenges. Learn how security leaders are navigating remote work challenges in their workplaces.
Cybersecurity threats are getting more sophisticated and intense amid the increasing levels of remote work and dependence on digital devices. Here are 5 that were the most damaging for enterprises in 2020.
As vaccine distribution continues through 2021, the companies managing the process must proactively think about their current risk level, how they can decrease that risk, and how they can strengthen their security posture moving forward.
File-sharing services, such as Google Drive, DropBox and personal OneDrive folders, also pose significant risk to the corporate network. The additional layering effect of file-sharing service — such as multiple shares of a potentially malicious file through a chain of services — create an additional layer of complexity and risk.
Energy giant Baker Hughes built its Global Intelligence & Travel Security Operations Center from the ground up, proving its value and relevancy to the greater enterprise amidst a global pandemic.
Supporting a goal of empowering regional teams to make the most informed decisions is Baker Hughes’s Global Intelligence & Travel Security Operations Center (GITSOC). When Baker Hughes separated from GE’s oil and gas division in 2019, the event presented a unique opportunity for the Security team to create its own operating model and processes from the ground up to support the organization independently, providing the catalyst for the creation of the GITSOC. Learn about energy giant Baker Hughes’ GITSOC, as well as its value and relevancy to the greater enterprise.
As lawmakers and law enforcement continue to unravel the events and impact of the crisis at the U.S. Capitol on Wednesday, January 6th, attention is turning to identification and prosecution of those that illegally entered, attacked, and looted the Capitol and the offices of the legislature housed there. We’re learning more about the litany of security failings and it is imperative that we take the lessons offered by this example and make the changes they demand now, at our state capitol buildings, as well as in our businesses.
In addition to his role as a cybersecurity lawyer, Roy E. Hadley Jr. is well-versed in the operational and technical aspects of cybersecurity. At Adams and Reese LLP, he assists clients with response and recovery efforts in the event of an attack and assists clients with hardening their enterprises against cyberattacks.
Barring winning a major lottery or inheritance, during a 40+ year working life in the security profession, security leaders will likely make a dozen or more job changes. While some of these may be significant responsibility shifts within a single organization, in today’s environment it is likely that a person will be changing organizations and even the type and/or responsibilities of various roles. One of those changes may include self-employment. Here’s what you need to know to ponder the transition.