Gartner Top Security Projects for 2020-2021

CEB IT

“Are you trying to ensure security for your remote workforce but don’t want to hinder business productivity?” ” “Are you struggling with identifying risks and gaps in security capabilities?” 1: Securing your remote workforce. Security

Is the Cloud Secure?

CEB IT

Cloud security breaches consistently make news headlines. The ambiguity that surrounds cloud computing can make securing the enterprise seem daunting. Concerns about security have led some CIOs to limit their organizational use of public cloud services. However, the challenge exists not in the security of the cloud itself, but in the policies and technologies for security and control of the technology. to “Am I using the cloud securely?”

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Top Actions From Gartner Hype Cycle for Cloud Security, 2020

CEB IT

Organizations may no longer question its utility, but security remains a commonly cited reason for avoiding it. In reality, the public cloud can be made secure enough for most uses. Here are three technologies from the Gartner Hype Cycle for Cloud Security, 2020, to action right now.

5 Questions to Cut Through the AI Security Hype

CEB IT

For security leaders, the reality is that current AI technology, including machine learning (ML) techniques, can augment security capabilities. In the area of anomaly detection and security analytics, humans working with AI accomplish much more than without it. Security

Building Like Amazon

Speaker: Leo Zhadanovsky, Principal Solutions Architect, Amazon Web Services

Amazon's journey to its current modern architecture and processes provides insights for all software development leaders. To get there, Amazon focused on decomposing for agility, making critical cultural and operational changes, and creating tools for software delivery. The result was enabling developers to rapidly release and iterate software while maintaining industry-leading standards on security, reliability, and performance. Whether you're developing for a small startup or a large corporation, learning the tools for CI/CD will make your good DevOps team great. We are excited to be joined by Leo Zhadanovsky, a Principal Solutions Architect at Amazon Web Services.

5 Strategic Cost Optimization Action Items for Security Leaders

CEB IT

Eighty-two percent of security and risk leaders do not adjust their budgets based on environmental or business impact, which means they operate in a silo and are not aligned with the business. Read more: Gartner Top 10 Security Projects for 2020-2021. Security

The Problem with Artificial Intelligence in Security

CTOvision

Read Dr. Leila Powell take a look at the security issues associated with artificial intelligence on Dark Reading: If you believed everything you read, artificial intelligence (AI) is the savior […].

China proposes global data security standards

Venture Beast

China is looking to establish global standards on data security, saying it wanted to promote multilateralism in the area. Big Data Business Enterprise Security Bytedance category-/Law & Government/Government China data security TikTok

Contrast Security

CTOvision

Contrast security seeks to usher in a new era of self-protecting software. From their website: Contrast Security is the world’s leading provider of security technology that enables software applications to protect themselves against cyberattacks. Only Contrast has intelligent agents that work actively inside applications to prevent data breaches, defeat hackers and secure the entire enterprise from development, to operations, to production. Research Team.

Are Your New Remote Workers Visible to Security Operations?

CEB IT

While this move creates obvious challenges for IT in terms of infrastructure and capacity, it’s also creating challenges for security teams as they push to scale remote work on a rapid and global level. Lack of visibility does not equate to a lack of security vulnerabilities.

The CSA IoT Security Controls Framework

CTOvision

Read Anastasios Arampatzis make a case for IoT Security Framework on Tripwire : The Internet of Things (IoT) is growing in technical, social, and economic significance.

Data Analytics in the Cloud for Developers and Founders

Speaker: Javier Ramírez, Senior AWS Developer Advocate, AWS

You have lots of data, and you are probably thinking of using the cloud to analyze it. But how will you move data into the cloud? In which format? How will you validate and prepare the data? What about streaming data? Can data scientists discover and use the data? Can business people create reports via drag and drop? Can operations monitor what’s going on? Will the data lake scale when you have twice as much data? Is your data secure? In this session, we address common pitfalls of building data lakes and show how AWS can help you manage data and analytics more efficiently.

How Security and Risk Leaders Can Prepare for Reduced Budgets

CEB IT

In the wake of a global pandemic, a CIO of a large tech firm asked the chief information security officer (CISO) to reduce spend by 10%. Read more: 7 Security Areas to Focus on During COVID-19. Cost savings within security/IT. Joint business and security cost savings.

Budget 255

Optimizing IoT Security by Implementing Artificial Intelligence

CTOvision

Read Liqaa Nawaf explain how artificial intelligence can help in optimizing Internet of Things security on Infosec Magazine : The Internet of Things (IoT) is growing rapidly in the markets […].

Cloud Security Spending Will Grow To $3.5 Billion By 2021

Forrester IT

What does this mean for cloud security? · This rapid shift to the cloud raises new issues and challenges for security and risk professionals. Traditional perimeter-based security tools do little to protect cloud workloads. Securing data and applications that reside in the cloud is increasingly critical as more mission-critical apps and high-value data and intellectual property move to the cloud. Cloud Security. cloud access security brokers.

Your Next Move: Chief Information Security Officer

Association of Information Technology Professional

This article details the necessary experience and education needed for a career as a chief information security officer

The 15-Minute, 7-Slide Security Presentation for Your Board of Directors

CEB IT

When the request comes in to give a cybersecurity presentation to the board, security leaders should jump at the chance to educate the executives. Security and risk leaders will be presenting to the board at least on an annual basis, with some on a more frequent rotation. . Board members will have many questions about the organization's security strategy during this unprecedented event. . Read more: 5 Security Questions Your Board Will Inevitably Ask.

The Product Dev Conundrum: To Build or Buy in a Digital World?

Speaker: Mark Ridley, Owner and Founder, Ridley Industries

Any PM or technical leader who’s led the charge of building a digital product knows that product engineering is one of the most expensive elements of business. In most cases, actually building software should be the last avenue that companies explore to deliver great products, as software engineering, data science and product development are complex, uncertain and hard to manage.

How to Stay Secure on GitHub

CTOvision

explain how you can stay secure on GitHub on Dark Reading : Open source software is a fact of life for enterprise software developers, and GitHub […]. Read Curtis Franklin Jr.

The Security Yearbook by Richard Stiennon

CTOvision

I am so excited to now have an autographed copy of The Security Yearbook by Richard Stiennon. Cyber Security News BooksRichard is a prolific writer, a fantastic speaker, and is known the world over as perhaps the most savvy of all analysts in the cybersecurity field. Many of us have learned from him over the years, but his […].

Fix your cloud security

David Linthicum

I found some interesting statistics in this RedLock article that illustrate the severity of the cloud security problem: Only 7 percent of businesses have good visibility of all critical data, and 58 percent say they only have slight visibility. More than three-fourths of security breaches (80%) involve privileged credentials.

ISACA and CSADC In Deep Examination of Public Cloud Security

CTOvision

17 Sep at 0830 Eastern ISACA and the Cloud Security Alliance DC Chapter are hosting a virtual event that will dive deep into the nexus of risk and opportunities in […].

Five critical cloud security challenges and how to overcome them

CTOvision

Read Chris Foster list five critical cloud security challenges and how to overcome them on Help Net Security : Today’s organizations desire the accessibility and flexibility of the cloud, yet […].

.Net 240

7 Security Areas to Focus on During COVID-19

CEB IT

Now that many workers have shifted to working remotely and organizations are distracted trying to handle the virus, security and risk management teams need to be more vigilant than ever. Most of the security and risk team is now operating in completely different environments and mindsets. “Take preemptive steps to ensure the resiliency and security of your organization’s operations as attackers seek to exploit human nature and nonstandard operating modes.”

Three Essential Mobile Security Measures

CTOvision

Read Andrew Hoog explain the three essential mobile security measures every company should adopt on DZone Blog : Many of us have heard of the 80/20 rule, also known as the ‘Pareto Principle.’ Applied to mobile application security, the idea is that guarding against threats with the greatest potential impact can mitigate 80 percent of […]. Cyber Security News

Mobile 210

Wickr: The Most Trusted and Secure Messenger in the World

CTOvision

With this post we are initiating coverage of Wickr in our Disruptive IT Directory as a Security Company We have tracked Wickr for years and use them extensively to communicate and collaborate with a wide range of stakeholders. Company Encryption Security Companies Wickr

Set Up a Budget-Friendly Application Security Program

CEB IT

In May 2020, a smartphone caller identification app reported a security breach in which the personal data of more than 47.5 In contrast to common perception, app security testing doesn’t always have to be a heavy investment. At the same time, reduced IT budgets meant that chief information security officers (CISOs) had to cut costs and compromise on risk management programs. Read more: How Security and Risk Leaders Can Prepare for Reduced Budgets. Security

Budget 182

Cloud Security Alliance DC Update: Explore The Boundary of Security & Privacy on 13 June Cruise

CTOvision

The Boundary of Security & Privacy Privacy is becoming an ever increasing concern in our world today. Social Networks today are now focusing on users’ privacy given the inherent security risks posed by organizations’ access to personally identifiable information. Cloud Computing Cyber Security NewsThe European Union has enacted GDPR valuing privacy whereas on the opposite end of the spectrum, […].

Maximizing data privacy: Making sensitive data secure by default

CTOvision

Read Ayal Yogev explain how companies can maximize data security by making sensitive data secure by default on Help Net Security : Consider the case of contact tracing, which has […].

.Net 221

Hire the Right Teachers for Better Security Awareness

CEB IT

This module on avoiding phishing scams at work is something every employee should want to know about and yet, like many security programs, this one is creating very little engagement. Hiring for the right skills in security awareness management roles will strengthen an organization’s overall program and security posture. Many employees view security training as boring and hard to understand. Dedicate security resources. Hire the right security trainers.

Securing connections in the cloud and across IoT devices

CTOvision

Read Jonathan Nguyen-Duy take a look at security threats to cloud and Internet of Things devices on Intelligent CIO : The hyper-connected, global marketplace of the 21st century has shifted […].

How To Improve Asset Management and Security

CTOvision

Read Gary Stevens explain how companies can improve asset management and security on Security Boulevard : You would be amazed at how many organizations still use archaic technologies to keep […].

Gartner Top 10 Security Projects for 2019

CEB IT

When George took over as the CISO of a retail company, IT security was relatively simple. But as the organization has grown — adding online ordering, more employees and a host of cloud-based platforms and technology to support digital business across the organization — so have the security vulnerabilities. Plus, increased attacks and phishing attempts make it difficult to know what security projects to focus on and where to get the most ROI. Project 9: Container security.

The Importance of Cyber Threat Intelligence in Improving Security Effectiveness

CTOvision

Read Jeff Guilfoyle explain the importance of cyber threat intelligence on Dark Reading : Unknown adversaries have seemingly limitless resources, putting pressure on security leaders to continually assess every aspect […].

The Growing Importance Of Cyber Security Skills

CTOvision

As data breaches have become the order of the day, Adi Gaskell explains the growing importance of having cyber security talent in your company on Forbes : Cybercrime costs the UK several billion pounds per year. CTO Cyber Security News Training and EducationIndeed, a recent government report showed that 46% of all businesses identified at least one cyber attack in the last […].

JASK: Modernizing security operations via an Autonomous Security Operations Center

CTOvision

Driven by AI and ML, the JASK autonomous security operations center (ASOC) platform frees analysts to become proactive threat investigators and responders. We believe the JASK approach is exactly what is needed in the continual struggle to automate security response.

Data-Centric Security and Zero Trust Architecture:

CTOvision

It’s been nearly ten years since John Kindervag first published a paper recommending what he called the “zero trust” model of information security. Cyber Security Disruptive IT information technology National securityThe time had come, he announced, to abandon the idea of unbreakable network perimeters, and to deal with the reality that intruders will inevitably find their way into protected networks. In the […].

Gartner Keynote: Leverage Automation for Modern Security

CEB IT

When Amy, the CISO of a healthcare provider, looked at cloud security across the enterprise, she realized the default access control models were creating a variety of access issues. BeWell’s infrastructure as a service (IaaS) providers defaulted to a secure state, allowing only the owner access. We’re now being asked how we’re helping the enterprise realize more value while assessing and managing risk, security and even safety. Security

Cyber Security in Aviation

CTOvision

Whether or not Roberts’ claims were true or whether or not his intentions were malicious, he brought to light the significant need to readdress aviation cyber security. During the 2015 Global Connected Aircraft Summit , a session was dedicated to the topic of aviation cyber security: “Cyber Security: How Can a Connected Aircraft Manage This Threat?” The increase of technology does not match the increase in technology security.

What’s the Future of IoT Security for Businesses?

CTOvision

Read Ben Canner take a look at the best practices in the Internet of Things security on Solutions Review : What is the future of the Internet of Things (IoT) […].

Your Next Move: Application Security Analyst

Association of Information Technology Professional

If you have an analytical mind and a penchant for problem solving, a career as an application security analyst may be for you

5G Security in an IoT Architecture

CTOvision

Read Roland Atoui take a look at the security of 5G in an Internet of Things architecture on IoT for All : 5G is in its early stages (available in […].

Automation For The Better Good - Security

Forrester IT

What these tasks have in common (in addition to relying on automation): a critical dependence on security. In a world where infrastructure-as-code scales quickly and massively scales, it is crucial to bake in security at every level of the stack. Information Security. Security Operations & Program Governance. application security.