17 Mar | View galleries
17 Mar | View galleries
Predictions for 2015 In the world of business, correctly seeing the future even a few months out can provide a leg up on the competition or, in the case of cybersecurity, on ever-present attackers. A missed guess can leave one scrambling to catch up. So, here are some predictions for 2015 on security from research firms Gartner and Forrester Research, and from Arthur W. Coviello Jr., executive chairman of RSA.
02 Jan | View galleries
CSO Trend Micro Workshop
30 Aug | View galleries
As the introduction of Australia’s mandatory Notifiable Data Breaches (NDB) legislation looms ever larger, many companies are limiting their ability to comply with the new rules by erroneously reassigning data-security budget to conventional governance, risk and compliance (GRC) activities.
Australians may have avoided the worst of the weekend’s massive WannaCry ransomware attack, which hit over 200,000 users and disabled businesses around the world over the weekend, but experts are warning that businesses that don’t double down on their cybersecurity defences may be T-boned as the first-generation ‘kill switch’ weakness is fixed and new variants of the ransomware worm are unleashed into the wild.
After a year in which |Budget allocations focused on cybersecurity industry and capability development, that industry has cautiously welcomed the more targeted funding announced as the Turnbull government uses this week’s federal Budget for 2017-18 to respond to a series of government IT-security disasters.
Accumulation of a growing body of data and analytics insights is rapidly progressing cybersecurity analysis from being a monitoring tool into something that can proactively predict future events, the head of an Australian analytics specialist has said on the eve of the company’s move into the massive US government market.
Cybersecurity has hit the agenda so quickly that it is now a “paramount national security risk”, one futurist warned even as French presidential candidate Emmanuel Macron weathered an email hack on the eve of the country’s election.
Fraudsters are using legitimate executive names and email addresses to dupe unsuspecting employees to wire money or sensitive documents to their accounts. The CTO of the Boston Celtics, for one, is fighting back.
Cyber security has transformed from what most viewed as an IT issue to a central business concern, and the CIO and CISO roles are shifting in response. If we’re to keep up the pace and adopt emerging technologies, security needs to be a priority and CIOs and CISOs need to work together to mitigate risk in organizations across industries and throughout government.
Security executives urge firms not to lose focus on prevention. They advise developing a holistic plan for IT and business units to fight cybersecurity together.
Participants in the White House Summit on Cybersecurity and Consumer Protection on Friday called for government/private sector information sharing, updated regulations, and improving the trust citizens have in the government's respect for privacy and civil liberties.
What Boards Want to Know and CISOs Need to Say Seven years ago in the SBIC report Bridging the CISO-CEO Divide, we explored the best practices security leaders could use to communicate more eﬀectively with their COs. CISOs were at a crossroads and just beginning to take a seat at the executive table. We provided recommendations from global leaders about ways CISOs could embrace their growing leadership role, build trust with the executive leadership team and earn the conﬁdence of their CO. We discussed how harting a new course based on a strategic, risk-based approach to information security would drive clear business value.
CSO Perspectives Roadshow Interview - Silas Barnes, Group Chief Information Security Officer, Virgin Australia Group
CSO Perspectives Roadshow 2017 Showreel
CSO Perspectives Roadshow Interview - Jeff Lanza, Retired FBI Agent (USA)
CSO Perspectives Roadshow Interview - Mark Loveless "Simple Nomad" Senior Security Researcher at Duo Security
Panel Session sponsored by VMware, Application Security: Does moving your applications to the Cloud mean reduced risk or just relocated risk?