Want to maximize your digital transformation project success and impact? Start by ensuring that you correctly explain risk to stakeholders, as well as continually benchmark your organization's risk management maturity, says ServiceNow's Barbara Kay.
ForgePoint Capital, a venture capital firm focused on cybersecurity, recently announced a new $450 million investment fund targeted solely on advancing cyber defenses. Alberto Yépez, managing director of ForgePoint, discusses his investment strategy.
Supply chain risk, security in the cloud, zero trust - these were three of the hottest topics at RSA Conference. And they were discussed candidly - and with some humor - when thought-leaders Edna Conway and Wendy Nather entered ISMG Studios.
Etay Maor has long been a force in cyber crime research. In his current role as CSO of Intsights, he has new views of breach trends, tools and techniques, as well as analysis of what's happening in fraud circles beyond the dark web.
The good news is: Organizations are embracing the cloud, and that's a boon to velocity and digital transformation. The bad news: Visibility and governance take a huge hit. Matt Kraning, CTO and co-founder of Expanse, discusses this challenge and how to improve cloud governance.
RSA CMO Holly Rollo and her adult daughter Emily find themselves in a unique position: They work at competing cybersecurity vendors. The Rollos open up on their backgrounds, careers and how the cybersecurity sector can grow through greater diversity.
Mobility, connectivity and the infrastructure-less IT environment - they add new degrees of difficulty to cybersecurity. Michael Covington of Wandera shares strategies for securing this modern workplace.
Do CISOs need to have deep technical proficiency? Many information security professionals will say: "Of course." Ask them which skills rank highest, however, and you'll hear words such as "communication" and "building trust," says Thom Langford, director of (TL)2 Security.
No advanced hacking skills required: The burgeoning cybercrime-as-a-service economy continues to make it easy for aspiring cybercriminals to procure highly automated, easy-to-use and effective attack tools to fuel illicit profits, says Liv Rowley, a threat intelligence analyst at Blueliv.
Russia, China, North Korea, Iran - the major nation-state actors are well known to cybersecurity leaders. But how do their motivations and tactics differ? Sanjay Virmani of San Francisco's FBI office shares insight on the nation-state threat.