The Town of Gilbert’s Office of Information Technology manages 1,500 employees and provides technical services for the community’s 260,000 residents.
In addition to maintaining hardware, such as municipal computers, telephones, and networking systems, they are responsible for providing connectivity for a wide...
On the cusp of 2022, John Kindervag - the father of the Zero Trust security model - reflects on how the Zero Trust dialogue has evolved in 2021 and makes his New Year's predictions. Will the president's executive order be an accelerator or an anchor? Which myths are ripe to be busted?
A data breach at Volvo Cars involving intellectual property theft highlights the need for identity and access management and deployment of next-gen cybersecurity measures, such as automotive security operations centers, or ASOCs, some experts say.
What does the C-suite want to know about ransomware preparedness and response strategies? CEO of (ISC)² Clar Rosso shares findings from the company's new report that provides insights into the minds of C-suite executives and how they perceive their organizations’ readiness for ransomware attacks.
Michael Lines is working with Information Security Media Group to promote awareness of the need for cyber risk management, and as a part of that initiative, the CyberEdBoard will post draft chapters from his upcoming book, "Heuristic Risk Management: Be Aware, Get Prepared, Defend Yourself." This post's chapter is...
Cyber GRX senior director and CyberEdBoard executive member Peter Gregory discusses data everyone has that is an asset, but also a liability - your contact list - and how to decrease your chances of it turning toxic.
The Zero Trust security model. It's not a single technology, but a programmatic approach that integrates elements of identity, network, application, data and cloud security to support a secure and agile business environment.
Over the span of mere weeks in 2020, Zero Trust went from being marketing's pet buzzword to...
Garry Hargreaves, director of the NATO Communications and Information - or NCI - Academy, discusses the institution's mission to train and educate NATO’s cyber workforce by creating an "enduring NATO cyberspace curriculum."
Sherry Lowe, who has been in senior leadership in the marketing space for over a decade, focuses on not letting metrics kill marketing. She discusses injecting more creativity into cybersecurity marketing strategy and standing out in a market full of look-alikes.
The findings from a penetration test can help you identify risks and gaps in your security controls. Charles Gillman offers tips to maximize the value of your next pen test and, in the process, deliver better results.
From the rain forest of northern Brazil to the business hub of Sao Paulo, Marco Túlio has built an impressive career in cybersecurity. He discusses the opportunity and challenge of enabling people to step up, succeed and eventually rise to be leaders in their own right.
Like CISOs everywhere, Dawn Cappelli of Rockwell Automation awoke last Friday to news about the Log4j vulnerability and the risk it posed to her company, customers and partners. Here is how she approached triage, response and capturing insights to be shared with other security leaders.
Two things you know when you sit down to speak to virtual CISO Chris Roberts: You're going to get the truth, and it's unlikely to be polished. He opens up on his passion to do good, and why he believes "mission before money" is the biggest challenge the industry now faces.
No question, the COVID-19 pandemic has been devastating for healthcare professionals. But it also has brought new opportunities for IT and security leaders to exercise unprecedented influence on healthcare enablement. Anahi Santiago, CISO of ChristianaCare, discusses this enormous responsibility.