Information security leader Peter Hoff joins Wursta as the Vice President of Cyber Security and Risk, developing risk assessment and cybersecurity tools for the firm.
9/11 had a transformative effect on security risk management, just as COVID-19 has on healthcare. The risk of terrorism had come directly into business operations, impacting employees as it never had before. Duty of care came to the fore with regards to security risks, both from a legislation perspective and the growing responsibility for corporates.
How long does a cybercriminal’s timeline usually take? What are their moves? And what tools do they usually employ? To answer these questions, it helps to think like a hacker.
The challenge companies now face is how they can maintain control over the security and privacy of their information, especially as they look to make remote and hybrid work permanent options after employees return to the workplace.
The path to success requires artificial intelligence and machine learning to supercharge the expertise and experience of an equally innovative and warm-bodied defender working as part of an enterprise security operations center and outsourced services like managed detection and response.
Jerry Caponera, Head of Risk Strategies at ThreatConnect, discusses the importance of developing a risk-oriented view into cybersecurity and why cyber risk needs to be quantified in the same way as operational risk or credit risk.
Pressing the reset button on security is only possible by disregarding the old-school ring-fencing and the rigid firewalls of the moat-castle mindset and embracing the zero trust mentality.
Industry experts can help you to understand not only the occupational fraud risks that come hand-in-hand with a “work from anywhere” model, but also how to address them with the latest biometrics.
The Cybersecurity and Infrastructure Security Agency created a new de-escalation series to help critical infrastructure owners and operators recognize, assess, de-escalate and report behaviors that raise concern.