17 Mar | View galleries
17 Mar | View galleries
Todd Bell looks back at his years in the security industry and offers up these seven tactics that will help you stay atop the field.
13 Nov | View galleries
More budget? Perhaps a little. More attention from senior management? Yes, a bit. Better results? That's not so clear.
22 Sep | View galleries
Governments and corporations alike must escalate the treatment of cybersecurity to the point where it is handled with the same severity as any other risk, speakers at this month’s Cisco Live! conference agreed as security and IT administrators gathered to weigh the progress of cybersecurity policy and technology.
It may not be a word that most CISOs use to describe their jobs, but the proclamation of Cisco Systems chief information security officer Steve Martino (read CSO Australia’s interview) that “it’s sexy to be a security person today” resonated strongly with the themes of this year’s Cisco Live! conference in Melbourne.
Taking on the role of the CISO can be a steep learning curve, particularly when it happens in the wake]] of a large cybersecurity incident. This, as cybersecurity breach posterchild Target appointed a new CISO.
Chief Information Security Officers are a relatively rare breed. Information security is, after all, a relatively recent addition or subset to IT, and while most large organizations now do profess to having a CISO, CSO or head of information security, many still don’t. Indeed, it’s often the case that a company appoints its first CISO in the aftermath of a data breach - like Target did in 2014 or Sony in 2011.
Looming mandatory breach notification laws have given Australian CISOs an opportunity to raise their organisational visibility by actively engaging users to build a culture in which data is classified and managed by default.
Cyber security has transformed from what most viewed as an IT issue to a central business concern, and the CIO and CISO roles are shifting in response. If we’re to keep up the pace and adopt emerging technologies, security needs to be a priority and CIOs and CISOs need to work together to mitigate risk in organizations across industries and throughout government.
What we are seeing across the region is that it is not one specific country being "hacked" more than another - but what we are seeing that the cyber criminals are looking for general weaknesses in our environment.
I see that more and more companies across so many sectors are embracing (although perhaps not loving) the CISO role as a critical decision-maker and influencer.
Everyday can be a D-Day for me and I love to celebrate success, no matter how small it is!
All networks are vulnerable because they have people using them. These are ordinary users focusing on getting their job done, not worrying about security. It is dangerous to assume that your workforce is “too smart” to avoid breaches. Understand that 94% of your employees will potentially be duped by a socially-engineered, targeted phishing scam. You can no longer afford to have just the traditional security solutions on your networks. These solutions will not offer you enough protection from within your organization. As CISO, you are going to need a new plan for dealing with Insider Threats. Your organization is at risk - get the latest report on the new wave of Insider Threats and start planning now.