Blog Posts Tagged with "Executives"
July 17, 2012 Added by:Ian Tibble
The idea that CEOs are responsible for all our problems is one of the sacred holy cows of the security industry. Security analysts, managers, self-proclaimed "Evangelists", "Subject Matter Experts", ad infinitum are responsible for the problems. Lets look at ourselves before blaming others...
June 19, 2012 Added by:Headlines
FBI Director Robert S. Mueller announced that Joseph M. Demarest will move to the Cyber Division as assistant director and that Cyber Division Section Chief James C. Burrell has been appointed deputy assistant director of the Cyber Division at FBI Headquarters...
June 17, 2012 Added by:Rafal Los
In the analysis of it, every organization needs to have someone responsible for the technology-based risk or security of the organization. Whether that's the Technology Manager, the CISO, or the "IT guy". I just want to see better security, more resiliency, and less technical risk....
June 08, 2012 Added by:Headlines
Under Secretary of Commerce for Standards and Technology and NIST Director Patrick Gallagher has selected William M. Holt, senior vice president and general manager of Intel Corporation's Technology and Manufacturing Group, to serve on the Visiting Committee on Advanced Technology (VCAT)...
March 19, 2012 Added by:Mary Shaddock Jones
The cost of implementing a compliance program will vary, however, it isn’t expensive enough to find yourself in front of the DOJ explaining why you spend money on air travel or paper clips than you do on a compliance program. Trust me, you don’t want to be in that position...
March 13, 2012 Added by:Rafal Los
Is the CISO willing to take on more business-focused responsibilities, and look at information security from a less technical solution-oriented perspective - and if so is that sustainable? If you're looking for advice I have a little bit here for you...
February 17, 2012 Added by:Rafal Los
Capability is often seen as the ability to enforce - whether its corporate politics, budget, or a top-down reporting structure. If you don't have the capability to force people to follow organization-wide decisions it is difficult to have a solid organization...
January 02, 2012 Added by:Thomas Fox
Any best practices compliance program has several moving parts, a CCO to lead the compliance program, a Compliance Department to execute the strategy and an engaged Board of Directors who oversee and participate. We applaud Hutchens approach and commend it for use by a company’s BoD...
December 04, 2011 Added by:Bill Gerneglia
Cyber attacks grow as corporations and governments amass information on individuals in complex networks across the Web, and cyber activists - some motivated by money, others by the desire to destabilize corporations and governments, continue to hack into organizational secrets...
December 01, 2011 Added by:Headlines
"Walker... withdrew money from a line of credit in the name of a trust that held an account at Farmers and Merchants. To cover up the scheme, Walker made interest payments on the money supposedly loaned to the trust. Walker will face a maximum sentence of 30 years in federal prison..."
November 30, 2011 Added by:Headlines
"Many executives have yet to seize upon the serious nature of the cybercrime threat. Cybercrime has emerged as a formidable threat, thanks to deeply determined, highly skilled, and well-organized cybercriminals, from nation states to hacktivists, from criminal gangs to lone-wolf perpetrators..."
September 23, 2011 Added by:Ron Baklarz
I am anxious to follow the evolution of the EC Council's new C|CISO certification, as it looks as though it will fill some gaps missing from other "gold-standard" certifications, and that are necessary for one aspiring to be or currently practicing security at the C-level...
September 07, 2011 Added by:Headlines
“Foster exploited his position as a trusted insider to embezzle tens of millions of dollars and to conceal the theft for as long as possible. The FBI is determined to uncover bank larceny in any form,” said FBI Assistant Director in Charge Fedarcyk...
March 29, 2011 Added by:Headlines
Boodaei calls the attack "VIGNS" - short for "Vanity Infection from Google News Searches" - and the purpose is to create the circumstance where the targeted victim will enable the attacker to circumvent security measures and infect the executive's computer with malware...
January 19, 2011 Added by:Headlines
Information theft accounts for 42 percent of total external costs. Costs associated with disruption to business or lost productivity accounts for 22 percent of external costs... Tangential to these costs is the expense by damage from negative press and lost customer/shareholder confidence...
Israeli Military and Hamas trade Hacking Att... lara croft on 07-31-2014
Cyphort Detects Surge in Ad Network Infectio... smith alexander on 07-30-2014
"Fake ID" Android Vulnerability in Lets Mali... smith alexander on 07-30-2014