With the RSA Conference virtual this year, ISMG replaced its two live on-site studios with a suite of home studios and produced a diverse group of interviews on timely topics with thought leaders who will be solving cybersecurity's most urgent problems.
Customer data, PII, web apps – your strategic assets are digital, and they require a new degree of digital risk protection. In this exclusive panel, CISOs Todd Carroll of CybelAngel and TJ Hart of PlanSource discuss the needs, scope and practical use cases.
It's not just traditional data governance – it's about business risk. And in the age of GDPR and CCPA, you’d best have a handle on data discovery and classification. Patrick Benoit of CBRE gives the BISO's perspective on data risk governance.
You can see it in the latest high-profile attacks: Security requirements are ever more complex, exceeding the capacity of current protection capabilities. Enterprises need a new strategy for defending entry points, and Tom Sego of BlastWave believes he has it.
As a global CISO and privacy officer, Rebecca Wynn has earned her stripes. And she's upfront with her expectations: She will take your security organization to the next level. But she also won't hesitate to walk away if she sees that cybersecurity commitment is nothing but talk.
How can healthcare organizations, which have been considered technology laggards, now become leaders? CISO Mitch Parker recommends that they implement technology - including security solutions - as part of a broader business strategy.
Security researchers who track ransomware often think such attacks must have hit their peak and can't get any worse - but then they do, thanks to top gangs continually improving the sophistication of their criminal enterprises, say McAfee's Raj Samani and John Fokker.
Nastassja Finnegan, CSO of First National Bank South Africa, says that the key to creating a strong culture of security in an organization is providing the right security context - and failure to do so results in pushback.
While ransomware attacks are largely viewed as cybersecurity incidents, there are critical data privacy concerns that must always be top of mind, says Jodi R. Daniels, founder and CEO of privacy consultancy Red Clover Advisors.
Attorney Ann Marie Mortimer shares tips on reducing liability in the event of a data breach and how ordinary security team communications, standard incident response reports and bug bounty payments can make a bad situation even worse.
The ransomware challenge facing organizations today traces directly to the success being enjoyed by gangs who wield such malware, says Palo Alto Networks' Jen Miller-Osborn, who describes new strategies to help disrupt this cybercrime business model, including the launch of the new Ransomware Task Force.
What are the top cybercrime trends and threats coming up, and what should organizations be doing now to best prepare? Trend Micro's Rik Ferguson describes threats that are likely to emerge and intensify by 2030 and what security steps all organizations should be taking now.
Cybersecurity professor Ron Woerner defines “unfluence” as the negative side of influence. He describes the principles of influence and psychology and how black hat hackers use them on their victims - and how to defend against these tactics.
Roger Sels of BlackBerry believes our approach to cybersecurity is broken. In this interview, he explains how security leaders can safeguard their organizations more effectively by resetting the status quo.
Allen Phelps, CEO of the security firm Trust Farm, reviews some of the tactics, techniques and procedures used by foreign influence threat actors to target research organizations and shares some best practices to defend against those threats.
In the wake of recent attacks on supply chains and critical infrastructure, Adrian Mayers says it's time for cybersecurity to be seen as an issue of national defense, and that cybersecurity leaders throughout the private and public sectors must embrace their role to protect national interests.