article thumbnail

Key skills tech leaders need to secure a board seat

CIO Business Intelligence

We’ve also published, in partnership with the Internet Security Alliance (ISA), the 2023 Director’s Handbook on Cyber-Risk Oversight. Search firms look for folks, but they’ll only find you through networking. Careers, CIO, CSO and CISO, IT Leadership, Security To get on a board, you must be in the governance circle.

Security 116
article thumbnail

Pinterest whistleblower Ifeoma Ozoma has a new way for tech workers to speak out

The Verge

On Wednesday, Ozoma launched the Tech Worker Handbook — a comprehensive online resource to help employees who want to speak out. The website includes information on how to secure legal counsel, engage with the media, and maintain digital and physical security. The project received funding from the Omidyar Network.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

FFIEC Updates Its Cybersecurity Guidelines For Financial Institutions

ForAllSecure

The resource guide is a valuable tool for financial institutions of all sizes as it provides best practices, recommendations, and resources to help organizations protect their networks and data from cyber threats. The guide also serves as an educational resource on the latest security technologies. Development Speed or Code Security.

article thumbnail

See You At RSA Conference 2017!

Cloud Musings

This course will cover the six domains of the Certified Cloud Security Professional (CCSP) CBK and deepen your knowledge of cloud computing and information security. Save you seat now by registering today for the 2017 RSA Conference, February 13 – 17, at the Moscone Center in San Francisco, CA. Jackson 2016 ) Follow me at [link].

article thumbnail

Technology Short Take 130

Scott Lowe

Networking. gNMI, by the way, stands for gRPC Network Management Interface (more information on gNMI can be found here ). Everyone’s favorite three-letter agency recently released some VPN security guidance, as reported by this InfoSecurity Magazine article. So, here it is—better late than never, right?

article thumbnail

The Hacker Mind Podcast: Hacking the Art of Invisibility

ForAllSecure

SO I only mention Ross Ulbricht in talks because I use him as an example of an Operation Security, or OpSec failure. Operational Security is typically a military process. Welcome to the hacker mind that original podcast from for all secure it's about challenging our expectations about the people who hack for a living.

Mobile 52
article thumbnail

The Hacker Mind Podcast: Car Hacking 0x05

ForAllSecure

That’s perhaps because of a dedicated group of hackers who are working to improve automotive security. Vamosi: Welcome to the hacker mind an original podcast from for all secure, it's about challenging our expectations about the people who hack for a living. Vamosi: Ethernet is a wired network. Leale: Yeah, the CANBus is.