article thumbnail

Combatting Phishing with Enhanced Cybersecurity Awareness Programs

SecureWorld News

At the end of the day, it turned out that this was the work of the company's information security team, aimed at showing management how simply attackers could gather data for targeted phishing campaigns. While these teams grasp the nuances of security, they might not be well-versed in the HR aspect.

article thumbnail

What IT leaders from BlackBerry, CN and Microsoft Canada and more predict for the future of InfoSec

CIO Business Intelligence

McClurg is among the speakers at The Canadian CSO Future of Information Security Summit , taking place virtually May 18 and 19. Gathering security executives from a variety of industries across Canada, the summit will focus on mitigating risk and building market trust.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What transformational leaders too often overlook

CIO Business Intelligence

High-performing CIOs know that digital mastery depends on a strong foundation of rock-solid infrastructure, information security, enterprise data management, and sound IT governance. Companies ahead of the curve with excellent infrastructure instrumentation have I&O reports on a daily basis. Most do it monthly.

article thumbnail

Jen Easterly Takes Charge of CISA At Black Hack USA 2021

ForAllSecure

It’s first directory, Chris Krebs, was fired by then-president Tump for saying that the 2020 election was the most secure election in history. Easterly first cleared up one of the biggest challenges facing information security today-- how to pronounce “CISA. exercise these whole nation attack plans to prepare.

article thumbnail

MACH37: America’s premier market-centric cybersecurity accelerator

CTOvision

Here is more on Mach37 from their website: The MACH37™ Accelerator is an intensive 90-day program that transforms innovative cybersecurity product ideas into validated, investment grade early stage companies that are positioned to provide the next generation of cyber security technologies. Lots is going on here.

article thumbnail

Penetration Testing Remote Workers

SecureWorld News

Devices owned by other companies that may be using the same network, wired or wireless, due to other family members working from home. While replies can generally reveal sensitive information in real attacks, links front-ending fake authentication pages tend to work best when trying to exploit users.

Social 91
article thumbnail

Experience “The Big Pivot”

Cloud Musings

No longer focused on using IT to improve the internal productivity of business functions, today’s best information executives partner with functional peers to deliver new business models and associated revenue streams. hire-to-retire, procure-to-pay, campaign-to-opportunity) and optimizes outcomes for customers and the entire company.

Data 118