The GDPR restricts how organizations can collect, use and retain personal data, and provides Europeans with certain rights to halt collection, and to obtain copies, correction and, at times, destruction of their data.
A Ponemon Institute study of more than 700 IT and security practitioners around the world found that the risk posed by insider threats is growing year-over-year, costing organizations significant money and resources as the threats continue to be difficult to detect, identify and manage.
The worldwide cybersecurity skills gap continues to present a significant challenge, with 59 percent of information security professionals reporting unfilled cyber/information security positions within their organization, according to ISACA’s cybersecurity workforce research.
With ransomware and distributed denial of service (DDoS) attacks on the rise, the average number of focused cyberattacks per organization has more than doubled this year compared to the previous 12 months.
The size, scope and importance of America’s utility sector make it a tempting target for terrorists looking to wreak havoc or for financial criminals looking to infiltrate and pilfer.
Your job is to be the curator and custodian of the organization’s security story. Your security story is the sum of all the ways your company defends assets, meets compliance and market criteria, implementing the right technologies that keep these said valuable assets safe.
The “gig economy” is about to consumerize the workplace to new levels, bringing changes that will significantly impact how CSOs and CISOs protect their businesses.