Welcome to Information Security Media Group's Black Hat and DEF CON 2024 Compendium featuring latest insights from the industry's top cybersecurity researchers and ethical hackers, as well as perspectives from CEOs, CISOs and government officials on the latest trends in cybersecurity and AI.
George Chacko, executive director of information security and compliance at New York Blood Center, shares his journey in cybersecurity, the challenges for nonprofit organizations with limited budgets and resources, and collaborative initiatives to improve security programs.
The SolarWinds case has intensified legal risks for CISOs. A judge validated the SEC's theory of intentional securities fraud against Tim Brown, the SolarWinds' CISO, marking the first time a federal court accepted this theory against a CISO, said Jess Nall, partner at Baker McKenzie.
The SolarWinds case has redefined cybersecurity disclosure obligations, especially for chief information security officers. The SEC's novel theories in this case have set a precedent for how organizations must present their cybersecurity practices, said Jennifer Lee, partner at Jenner & Block.
Cybersecurity consulting encompasses a wide array of services and specialties, ranging from high-level strategic guidance to hands-on technical support. Discover the categories and learn how to position yourself as a trusted expert in the cybersecurity consulting field.
David Gee, board risk adviser, non-executive director and author, shares leadership lessons from his career in his latest book, "The Aspiring CIO and CISO." He discusses his approach to managing cybersecurity risks, engaging with teams and simplifying communication.
Most hospitals prioritize cybersecurity but often lack the necessary resources to comply with these goals. The question becomes not about the practices, but the potential barriers to implementation, according to John Riggi at the American Hospital Association.
Cybersecurity incidents are not just technical problems. They are also major public relations challenges. Effective IT and cybersecurity leadership during a crisis can significantly affect your company's reputation, stakeholder trust and overall recovery - and have a big impact on your career.
Kenneth Townsend, CISO of Ingredion Inc., shares strategies for managing cybersecurity in the manufacturing sector. He discusses the balance between flexibility and security and the need to understand business operations and leverage managed services for comprehensive protection.
Social engineering, which involves manipulating individuals into sharing confidential data or performing actions that compromise security, is a big threat. As organizations realize the importance of addressing human-centric security risks, the demand for social engineering defense experts will rise.
To make cybersecurity a business enabler, cybersecurity teams need to focus on opening things up in a secure fashion so that the functionality and productivity of the business can flourish. Hearst's Andres Andreu discusses the areas in which this can be done.
Resilience, grit and adaptability are key traits for success in the professional world. But what happens when these qualities are put to the test? Unexpected events can shake us to our core and challenge our ability to persevere and adapt. Here's how to navigate such situations.
In the current economic climate, CISOs must shift priorities to ensure company survival. Don Gibson, CISO at Kinly, advises security leaders to reevaluate their strategies, optimize resource allocation and leverage existing tools to increase their return on investment.
Aman Sood began his career in cybersecurity as a help desk analyst, handling tasks such as resetting user passwords and providing technical support. He shares his journey from analyst to cybersecurity vice president, discusses the challenges and offers advice to aspiring security professionals.
Jez Reichmann, deputy CISO at Channel 4 Corp., discusses the dual importance of technical expertise and managerial skills in cybersecurity leadership. He emphasizes the human element in managing teams and keeping them motivated and in maintaining cybersecurity.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.