Cybersecurity regulations are gaining momentum globally, and for good reason. Tanium CIO Erik Gaston discussed the evolving nature of regulatory initiatives in the United States and the European Union and how IT organizations can navigate changing requirements.
Traditional hiring methods often emphasize educational background and work experience, but the White House is encouraging efforts to transition federal and contractor roles to a skills-based framework. Here's how and why to consider taking this approach.
Security leaders face significant challenges in securing OT environments, especially with increasing geopolitical disruptions and psychological barriers. Trish McGill, IT and OT cybersecurity expert at Ilionx, emphasized the importance of addressing these psychological factors to bridge the IT-OT divide.
By decentralizing the ownership of cybersecurity and increasing security consciousness among everyone in the organization, businesses can improve their security posture, said Dom Lombardi, the vice president of security and trust at Kandji. He discussed the concept of collaborative security.
Ian Thornton-Trump, CISO of Cyjax, shared the importance of flexibility and continuous learning - key qualities that have shaped his career. These skills are crucial in adapting to the rapidly changing cybersecurity landscape and preparing for emerging threats, he said.
U.S. Sen. Ron Wyden, D-Ore., is urging the U.S. Securities and Exchange Commission and the Federal Trade Commission to open investigations into the February cyberattack on UnitedHealth Group's Change Healthcare unit and asking the agencies to hold the company's CEO and board responsible.
From malware analyst and ethical hacker to CISO of AboitizPower, Alexander Antukh's cybersecurity journey has shaped his leadership style. He discusses strategies for addressing cybersecurity threats in critical infrastructure and ensuring secure remote access.
Institutional knowledge, often referred to as tribal knowledge, plays a pivotal role in the success and continuity of any organization. Here are several strategies and practices chief information security officers and chief information officers can use to maintain institutional knowledge.
CISOs face increasing legal and compliance responsibilities amid growing cybersecurity challenges. Ex-CSO Joe Sullivan of Ukraine Friends and Aravind Swaminathan of Orrick, Herrington & Sutcliffe discuss the need for fundamental processes and constant communication with stakeholders.
Bias lurks everywhere in generative artificial intelligence: in the data, in the model, in the human interpreting the output of a model. That's why one of the biggest emerging security threats is relying on generative AI for important business decisions, said Vice President and CISO Rick Doten.
Tiauna Ross’ career journey has taken her from CPA to security leader - she is senior director, digital and ERP cybersecurity, CCI, at Stryker. Ross shares strategies for team empowerment, task management, innovation, vendor relationships, mentorship and business acumen.
Cybersecurity is a "team sport" requiring technology to align with robust policy frameworks to secure nations as well as organizations, said Marene Allison, CEO of Marene Allison Consulting. "All these pieces must come together - technology, government policy and corporate strategy," she said.
Imposter syndrome is a psychological phenomenon in which individuals doubt their accomplishments and have an internalized fear of being exposed as a fraud. Employees can overcome these fears by finding mentors, documenting achievements and engaging in continuous learning.
From working in B2B industries to now shifting to a B2C industry, Nicole Darden Ford, CISO, Nordstrom, is confident of bringing a fresh perspective to tackling the retail sector's complex cybersecurity and fraud challenges.
From the RSA Conference in San Francisco, five ISMG editors covered the major themes at the event including emerging threats related to AI and new AI-embedded cybersecurity solutions. Other hot topics included ransomware threats, nation-state attackers and the role of the CISO.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.