"If you can plan for the zombie apocalypse, you can probably face just about anything," said Tim Callahan, Senior Vice President, and Global Chief Information Security Officer, Aflac during a talk in my Master's level class o...
Security Operating Center (SOC) staff members are often consumed with tedious manual tasks that lead to burnout and can cost organizations millions of dollars in losses due to human error. Thomas Kinsella, Co-Founder & Chief ...
In a recent news release, Reuters reported that "United States has offered a $15 million reward for information on Conti ransomware group. The FBI estimates that more than 1,000 victims of the Conti group have paid a total in...
How do you make security a first-class citizen of the software development process? According to an industry report, “many information security engineers don’t understand software development—and most software developers don’...
In a wide-ranging discussion, Vishal Salvi, CISO & Head of Cyber Practice at Infosys , sheds light on a range of topics from CISO empowerment to creating and sustaining a high-performance information security culture. He high...
Using compelling stories and metaphors, Ted Harrington, author of Hackable: How To Do Application Security Right, and Executive Partner at Independent Security Evaluators , explains the process of hacking and the importance o...
"The story of the RMS Titanic has served as a grim reminder that regulatory compliance does not guarantee safety or security. The ship was carrying 2,224 passengers and crew when it sank one April night in 1912, killing over ...
"Security experts are split on cyber insurance and its place in business, with just as many arguing that it is a useless add-on as an essential business enabler." A KPMG study indicated that these policies were not overly tru...
The phenomenon of cyber trauma is very real and individuals and organizations are often not adequately prepared to deal with it. Patrick Wheeler , a Luxembourg-based cybersecurity practitioner and Director of the Cyber Wayfin...
Art Ehuan, Vice President, Palo Alto Networks, and Former FBI Special Agent , discusses at length the unfortunate evolution and escalation of ransomware attacks. He explains how the threat actors have upped their game and are...
Cybersecurity communication should be simple, immersive, attractive, continuous, and multi-channel, says Marcin Ganclerz , a subject matter expert. He passionately argues for creating a 'culture of enablement and not fear' so...
In episode 18, Alan Mihalic, President IoT Security Institute , speaks to the challenges and success factors associated with securing Internet-of-Things (IoT) devices in smart supply chains. He draws upon the IoT Security Fra...
When justifying cybersecurity investments, Andy Bates, Chief Development and Strategic Partnership Officer, Global Cyber Alliance , recommends making the business case from the standpoint of reducing the carbon footprint. He ...
Nadia El Fertasi, Human Readiness and Resilience Expert and former NATO senior executive, highlights the importance of leveraging emotional intelligence to create and sustain a healthy information security culture. During a v...
Renowned authority in human-technology interactions and Presidential appointee Prof. Missy Cummings of Duke University, spoke to the importance of understanding human motivation and behavior to proactively predict and detect ...
Robert Austin, Professor, Ivey Business School , discusses the value of cyber-attack simulation by drawing upon the learning tool (IT Management Simulation: Cyber Attack!, Harvard Business School Publishing) that he has devel...
"Cybersecurity is patient safety and patient safety is cybersecurity," is how Stoddard Manikin, Chief Information Security Officer, Children's Healthcare of Atlanta , described the significance of cybersecurity readiness in t...
The incredibly articulate Anne Leslie, Threat Management Consultant, IBM Security , shares some powerful messages and recommendations on threat management. One such message is to nurture a Whole-of-Enterprise approach where "...
Fly the Plane is how Dr. Timothy Chester, Vice President of Information Technology, The University of Georgia , characterizes his philosophy and approach to cybersecurity readiness. Dr. Chester spoke at length about a proacti...
Driven by a mission and passion to fight online crime, Ori Eisen, Founder and CEO of Trusona , explains the fundamentals of passwordless authentication and why it is a superior and simpler way of securing access. He also disp...
While small and medium-sized enterprises (SMEs) face the same cybersecurity issues as large enterprises, SMEs don’t have the resources to effectively manage those risks. Research reports reveal alarming statistics on the stat...
From the standpoint of cybersecurity governance, how does an organization stay on the right side of the law? Rois Ni Thuama, Ph.D. (Doctor of Law), Head of Cyber Governance, Red Sift , spoke with great clarity and eloquence i...
In a very engaging and thoughtful discussion, Dr. Jimmie Lenz, Dir. Master of Engineering in FinTech and Master of Engineering in Cybersecurity at Duke University's Pratt School of Engineering , spoke to the importance of a m...
Ram R. Kumar, Executive Director, AT&T Business, discusses at length significant cybersecurity governance issues, from achieving inter-and intra-organizational buy-in to employee empowerment, education and training, integrat...