article thumbnail

5 challenges for securing the future

CIO Business Intelligence

Information security has been an intriguing part of our past, is a critical part of our present, and will be a defining factor in our future. The economics of security are clear: “There is no financial stability without cybersecurity,” writes Loretta J. To have a future requires mastering information security.

Security 128
article thumbnail

The CISO role in cybersecurity: Solo or team sport?

Cloud Musings

The average length of time in the commercial sector between a network security breach and when the detection of that breach is more than 240 days , according to Gregory Touhill , deputy assistant secretary of Cybersecurity Operations and Programs for the Department of Homeland Security. Could your company survive?

Sports 70
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

SecureWorld Returns to Houston with Energy and Enthusiasm

SecureWorld News

On top of that, even the role before this one, it was a private company, and so I had a reporting relationship to the board," Boehl said. "So RELATED: Here's an article from The National CIO Review on "The Organizational Importance of the Chief Information Security Officer."

Energy 79
article thumbnail

Spotlight on Cybersecurity Leaders: David Lingenfelter

SecureWorld News

David Lingenfelter is Vice President of Information Security for Penn Entertainment. His role includes overseeing IT security for the company, as well as overseeing IT compliance around SOX, PCI, and gaming regulations. At the time, IT Security was in its infancy as momentum of the dot-com era was just starting to build.

article thumbnail

Fixed wireless access (FWA) is a secure networking option

CIO Business Intelligence

This shows that many modern cyber security challenges are network-agnostic, which means the most popular cyber attack methods typically don’t focus on the network technology the company uses to access the internet. Security vulnerabilities Did you know devices that connect to your business internet can put your entire business at risk?

article thumbnail

The chaotic and cinematic MGM casino hack, explained

Vox

MGM, which owns more than two dozen hotel and casino locations around the world as well as an online sports betting arm, reported on Monday that a “cybersecurity issue” was affecting some of its systems, which it shut down to “protect our systems and data.” Even websites for its many properties went offline for a while. It’s pretty simple.”

article thumbnail

Spooky, Scary Tales of Vendor Management

SecureWorld News

The first one said, "For this company, vendor management doesn't seem to matta." The third one said, "Silly company, in the event of a breach, it will be a nasty affair." With over 59% of all data breaches being traced back to a third-party vendor or supplier, companies need to be laser focused on their vendor management programs.