featureHow cybersecurity teams should prepare for geopolitical crisis spilloverCISOs can anticipate and prepare for cyberattacks conducted by participants in geopolitical conflict such as the Israel/Hamas war by understanding the threat actors' motivations and goals.By Christopher Whyte05 Dec 202312 minsAdvanced Persistent ThreatsThreat and Vulnerability ManagementRisk Management feature 4 budget-savvy strategies for building an effective purple teamBy Maril Vernon04 Dec 202314 minsThreat and Vulnerability ManagementIT Training Risk Managementfeature How US SEC legal actions put CISOs at risk and what to do about itBy Evan Schuman16 Nov 20238 minsCSO and CISOComplianceRisk Management newsBigID unveils new data risk remediation guidance featureBy Michael Hill 09 Nov 20234 minsThreat and Vulnerability ManagementData and Information SecurityRisk Management newsEclypsium launches supply chain security guide to track risks and incidentsBy Michael Hill 07 Nov 20233 minsRisk ManagementSupply Chain feature7 best practices for enterprise attack surface managementBy Shannon Flynn 01 Nov 20239 minsThreat and Vulnerability ManagementRisk Management featureHow to choose the best cloud security posture management toolsBy Linda Rosencrance 30 Oct 20238 minsThreat and Vulnerability ManagementCloud SecurityData and Information Security featureHow much cybersecurity expertise does a board need?By Ericka Chickowski 25 Oct 202312 minsCSO and CISORisk Management featureOops! When tech innovations create new security threatsBy Jon Murphy 24 Oct 20235 minsThreat and Vulnerability ManagementRisk ManagementVulnerabilities ArticlesfeatureWhy Instagram Threads is a hotbed of risks for businessesThreads is already a target for fraud and abuse, with several potential security and compliance risks associated with its use for organizations.By Michael Hill 04 Sep 2023 8 minsPhishingHackingSocial EngineeringnewsGoogle Cloud announces Duet AI enhancements for Mandiant, ChronicleNew AI-enabled capabilites aim to simplify threat analysis and hunting, and make security personnel more productive.By Michael Nadeau 29 Aug 2023 3 minsGenerative AISecurity Operations CenterThreat and Vulnerability Managementnews analysisTime and effort to obtain cyber insurance increasing for US businessesOrganizations continue to invest in cybersecurity solutions to meet requirements for cyber insurance policies.By Michael Hill 29 Aug 2023 4 minsCSO and CISORisk ManagementfeatureHow financial institutions can reduce security and other risks from MRAsHere's advice on avoiding breakdowns or inadequacies in a US financial institution's security and privacy policies and procedures that can trigger a matter requiring attention notice.By Perry Menezes, Partner/MD, Head, Financial Services, MorganFranklin Consulting; Ahsan Sheikh, CISRO, US Financial Services; Thomas Kartanowicz, CISO Europe and Americas, Global Financial Services Firm; Marco Maiurano, CISO, Large US Financial Services Firm; John Rogers, Global CISO, FinTech Firm; Paul Moreira, Global German Bank, Regional Head, Cyber, BCM, VRM, Operational resilience 29 Aug 2023 10 minsFinancial Services IndustryComplianceRisk Managementnews analysisMost businesses to ban ChatGPT, generative AI apps on work devicesAlmost two-thirds of companies deploying/considering generative AI bans view the steps as long term or permanent.By Michael Hill 08 Aug 2023 3 minsCSO and CISOGenerative AIRisk ManagementnewsVulcan Cyber launches predictive risk prioritization through new ML capabilityVulcan Cyber Attack Path Graph will prioritize cloud-native asset and vulnerability risks.By Shweta Sharma 03 Aug 2023 2 minsRisk ManagementSecurity SoftwarenewsPalo Alto Networks adds new CI/CD security module to Prisma CloudNew module addresses security challenges of modern engineering ecosystems with capabilities spanning visibility, control, risk management, and breach detection.By Michael Hill 27 Jul 2023 5 minsCloud SecurityRisk ManagementnewsAuditBoard launches new IT risk management offeringThe new application is an extension to AuditBoard’s connected risk platform and its suite of IT risk and compliance solutions, designed for information security teams.By Apurva Venkat 27 Jul 2023 2 minsRisk ManagementfeatureTop cybersecurity tools aimed at protecting executivesExecutive cyber protection tools provide security for those at the top of the organization with special privileges and access to sensitive information. These are some of the options.By Rosalyn Page 25 Jul 2023 6 minsEndpoint ProtectionRisk ManagementnewsCode42 adds customizable insider risk alerts to IncydrCode42's Incydr now enables security teams to create context-based insider risk alerts using customizable indicators.By Shweta Sharma 21 Jul 2023 3 minsRisk ManagementfeatureWhy and how CISOs should work with lawyers to address regulatory burdensAs the scope of cybersecurity related regulations grows, CISOs may need to partner more closely with legal teams to understand the changing requirements.By Rosalyn Page 19 Jul 2023 11 minsRegulationComplianceRisk Managementnews analysis7 most likely generative AI business use cases and their security risksGenerative AI use cases vary significantly across a business, as do the security risks they introduce.By Michael Hill 13 Jul 2023 4 minsGenerative AIRisk Management Show more Show less View all Resources whitepaper Test & Learn - The ultimate guide to delivering high quality, high impact products This year, the Progressive Delivery and Experimentation Summit, brought together nearly 1500 professionals. Leaders from Product, Engineering, and Data presented frameworks for adapting software development and delivery practices The post Test & Learn – The ultimate guide to delivering high quality, high impact products appeared first on Whitepaper Repository. By Optimizely 18 Sep 2023Business OperationsFinance and Accounting SystemsMarketing Software whitepaper Modernize and Scale on AWS By Koan 22 Aug 2023Amazon Web ServicesCloud ManagementIT Management whitepaper The Total Economic Impact(TM) Of Optimizely Digital Experience Platform By Optimizely 06 Aug 2023Business OperationsFinance and Accounting SystemsMarketing Software View all Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. 21 Dec 2021 18 minsRisk ManagementSecurity How chemical manufacturer Celanese secures its IT and OT environments 17 Sep 2021 28 minsRisk ManagementSecurity Securing the software supply chain: A structured approach 18 Jun 2021 25 minsSupply ChainRisk ManagementSecurity Strategies for elevating security to an evergreen business priority 16 Apr 2021 23 minsRisk ManagementIT LeadershipSecurity See all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news UK CSO 30 Awards 2023 winners announced By Romy Tuin 05 Dec 20234 mins CSO and CISOC-SuiteRoles news analysis Deepfakes emerge as a top security threat ahead of the 2024 US election By Cynthia Brumfield 05 Dec 20237 mins Election HackingGovernmentSecurity Practices news analysis P2Pinfect Redis worm targets IoT with version for MIPS devices By Lucian Constantin 04 Dec 20235 mins BotnetsHacker GroupsSecurity Practices podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO