article thumbnail

Grab two essential IT certifications on networking, information security and cybersecurity

TechSpot

This comprehensive 2-part bundle will help you ace the exams for the Systems Security Certified Practitioner (SSCP) and Certified Information Systems Security Professional (CISSP) certifications -- all through training that focuses on real-world examples.

article thumbnail

IDG Contributor Network: How to build a thriving information security function despite the talent shortage

ComputerWorld IT Management

It seems that the industry has reached a nearly unanimous conclusion about a key essential for tight information security -- people. As an example, following a major security breach at the U.S. As an example, following a major security breach at the U.S.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

InfoSec Leaders Share in Podcast Interview at SecureWorld Philadelphia

SecureWorld News

Featured guests are Krista Arndt, CISO, United Musculoskeletal Partners; David Lingenfelter, VP of Information Security, Penn Entertainment; and Bistra Lutz, Director of Global Information Security Operations, Crown Holdings. Find the recording on the BarCode website , on Apple Podcasts , or on YouTube.

Barcode 105
article thumbnail

6 steps the manufacturer of Arm & Hammer and OxiClean took to harden OT cybersecurity

CIO Business Intelligence

For example, the 2023 ransomware attack against Clorox caused order processing delays and product outages that reduced quarterly sales by 23% to 28%, which likely amounts to more than $500 million. It’s no longer a question of whether an attack will occur, but when, and the consequences of a successful attack can be dire.

Network 120
article thumbnail

How Zero Trust can help align the CIO and CISO

CIO Business Intelligence

The role of the CIO (Chief Information Officer) and CISO (Chief Information Security Officer) have become increasingly important in recent years as organizations place more emphasis on digital transformation and information security.

article thumbnail

Photograph Leak Demonstrates Importance of Good Hygiene

CTOvision

The Washington Post , The New York Times , and The Wall Street Journal have dedicated front-page links to the story, in a press wave that will contribute to the public’s increasing exposure to cybersecurity concepts and the growing importance of information security. The scandal reflects several technology trends.

article thumbnail

InfoSec Policies and Standards: Some strategic context for those just diving into this world

CTOvision

Organizations are giving more priority to development of information security policies, as protecting their assets is one of the prominent things that needs to be considered. So an organization makes different strategies in implementing a security policy successfully. Get Management Support. Write Policies. Implement policies.

Policies 268