article thumbnail

Combatting Phishing with Enhanced Cybersecurity Awareness Programs

SecureWorld News

At the end of the day, it turned out that this was the work of the company's information security team, aimed at showing management how simply attackers could gather data for targeted phishing campaigns. These could be booklets, information sheets, lectures, training, mentoring, video courses, simulated phishing campaigns , etc.

article thumbnail

Join Women in Cybersecurity This Week in Dallas

CTOvision

Speakers for this year’s event include: Regina Wallace-Jones, Head of Security Operations, Facebook. White, VP Senior Information Security Officer, Global Information Security, Bank of America. Heather Adkins, Founding member of the Google Security Team. Margaret N.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What makes a CIO truly great?

CIO Business Intelligence

Of course, I do have to add a qualifier here because it is not enough to be a great communicator. Receivers of messages are paying increasingly deeper attention to the authenticity and substance of the narrative being presented. Add “communicator” then to the list of must-have CIO adjectives. Today, it’s all about data.

article thumbnail

Spotlight on Cybersecurity Leaders: William Lidster

SecureWorld News

W illiam Lidster has been with AAA Washington since August of 2017, serving as the leader of its information security an d compliance efforts. He is responsible to establish a responsive, dynamic, and flexible cybersecurity program to meet continually changing information security, regulatory, and compliance needs in the organization.

article thumbnail

A New Phishing Defense: Slow Down and Frown?

SecureWorld News

Finney, Chief Information Security Officer at Southern Methodist University, SecureWorld Advisory Councilmember, and keynote speaker at this year's virtual Texas conference, developed a technique to help users discern between safe emails and phishing messages. Does it make a difference between your brain's response?

article thumbnail

5 Best Career Options for Students in Computer Science Engineering

Galido

You are almost out of sync with the scientific developments if you’ve not studied a STEM-related course. One of such courses is Computer Science Engineering. Well, that’s the much a course in Computer Science Engineering can do for you. Information Security Analysts. The cherry on the cake is the salary you earn.

article thumbnail

‘The Everything War’: Inside Amazon with author and Wall Street Journal reporter Dana Mattioli

GeekWire

.’ “ Amazon’s response: “We do not condone the misuse of proprietary confidential information, and thoroughly investigate any reports of employees doing so and take action, which may include termination. We have strict policies in place and keeping proprietary information secure is embedded into how the team operates.”

Journal 103