article thumbnail

The CISO role in cybersecurity: Solo or team sport?

Cloud Musings

This alarming statistic is just one of the reasons why the National Cybersecurity Institute at Excelsior College (NCI) undertook the task of surveying the nation’s chief information security officers. Which of the following are the top five sources of application security risk within your organization?

Sports 70
article thumbnail

SecureWorld Returns to Houston with Energy and Enthusiasm

SecureWorld News

RELATED: Here's an article from The National CIO Review on "The Organizational Importance of the Chief Information Security Officer." They go through data analytics, a business application, digital applications, etc. Al Lindseth, Principal, CI5O Advisory Services LLC "Cybersecurity Really Is a Team Sport," Shawn E.

Energy 73
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Spotlight on Cybersecurity Leaders: David Lingenfelter

SecureWorld News

David Lingenfelter is Vice President of Information Security for Penn Entertainment. His role includes overseeing IT security for the company, as well as overseeing IT compliance around SOX, PCI, and gaming regulations. At the time, IT Security was in its infancy as momentum of the dot-com era was just starting to build.

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

The Verizon Threat Research Advisory Center provides monthly webinars packed with insightful analysis to help unmask threat actors’ evolving tactics, techniques and procedures (TTPs), and provides other insights to help you stay informed.

article thumbnail

Spooky, Scary Tales of Vendor Management

SecureWorld News

Discipline is key and not only for sports teams. Next, you should consider what type of information security and physical security your organization's vendors should be following. Sometimes a shortcut in the short term can mean litigation and extended difficulties in the long run.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

But how exactly will artificial intelligence help bridge the information security skills gap? And even with the help of machine learning algorithms, what kinds of security work is still best left to humans? Paul Roberts: This Security Ledgers Spotlight podcast is sponsored by ForAllSecure. Listen here: [link]. Transcript.

article thumbnail

Security Ledger Podcast: Security Automation Is (And Isn't) The Future Of InfoSec

ForAllSecure

But how exactly will artificial intelligence help bridge the information security skills gap? And even with the help of machine learning algorithms, what kinds of security work is still best left to humans? Paul Roberts: This Security Ledgers Spotlight podcast is sponsored by ForAllSecure. Listen here: [link]. Transcript.