George Chacko, executive director of information security and compliance at New York Blood Center, shares his journey in cybersecurity, the challenges for nonprofit organizations with limited budgets and resources, and collaborative initiatives to improve security programs.
When executives fully understand the potential impact and cost of cyberthreats, they can better assign the necessary resources to combat them. Learn about how Verizon's CRQ can help to improve an organization's cybersecurity investments and resilience.
In the latest weekly update, ISMG editors discussed the evolving disclosure responsibilities of CISOs, yet another ransomware attack targeting the healthcare sector, and Mimecast's latest strategic acquisition as part of its broader expansion efforts.
Welcome to Information Security Media Group's Infosecurity Europe 2024 Compendium featuring cybersecurity insights from industry's top researchers, CEOs, CISOs, government leaders and more. Inside this 30-page guide, you'll find links to dozens of videos created by ISMG.Studio.
As the chief privacy officer at UChicago Medicine, Karen Habercoss likes to tell her peers, "I know more about security than the average bear." And her knowledge has been put to the test in recent years, with the adjustment to remote work, telehealth and digital transformation.
At ISMG's 2024 Cybersecurity Summit in New Delhi, security leaders and policymakers gathered to discuss AI's transformative role in cybersecurity, national cyber resilience strategies and emerging threats including deepfakes. The event offered critical insights on evolving risks and defense tactics.
David Gee, board risk adviser, non-executive director and author, shares leadership lessons from his career in his latest book, "The Aspiring CIO and CISO." He discusses his approach to managing cybersecurity risks, engaging with teams and simplifying communication.
The editorial team at Information Security Media Group interviewed 60 of the most well-known and influential leaders in the industry at RSA Conference 2024. Inside this 40-page CEO/Founder Compendium, you'll find insights on leadership, emerging trends in cybersecurity and the latest technologies.
Small and medium-sized businesses are vulnerable to cyberthreats, often due to insufficient investment in security measures. Joe Levy, CEO of Sophos, shares insights on enhancing SMB cybersecurity outcomes, with a focus on combating ransomware and protecting vital supply chains.
Check Point Software tapped the longtime leader of an Israeli cybersecurity incubator to be just the second CEO in the firewall behemoth's 32-year history. The company selected Team8 co-founder and Managing Partner Nadav Zafrir to replace Gil Shwed, who has led Check Point since inception in 1993.
Cybersecurity incidents are not just technical problems. They are also major public relations challenges. Effective IT and cybersecurity leadership during a crisis can significantly affect your company's reputation, stakeholder trust and overall recovery - and have a big impact on your career.
Kenneth Townsend, CISO of Ingredion Inc., shares strategies for managing cybersecurity in the manufacturing sector. He discusses the balance between flexibility and security and the need to understand business operations and leverage managed services for comprehensive protection.
To make cybersecurity a business enabler, cybersecurity teams need to focus on opening things up in a secure fashion so that the functionality and productivity of the business can flourish. Hearst's Andres Andreu discusses the areas in which this can be done.
Steve King served in senior leadership roles in technology development and deployment for the past 25 years. He worked as author, serial startup founder, CIO, CTO, CISO, CMO and - most recently - a passionate campaigner for cybersecurity education at ISMG. King died June 27, 2024, after an illness.
Resilience, grit and adaptability are key traits for success in the professional world. But what happens when these qualities are put to the test? Unexpected events can shake us to our core and challenge our ability to persevere and adapt. Here's how to navigate such situations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.