CSO's collection of videos on topics ranging from cryptocurrency to data breaches to security leadership, as well as IT security-related videos from some of Foundry's most popular virtual summits,
Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of "trust no one". We explain the concept in this video.
ChatGPT and other AI tools can create content that helps bad actors create better phishing emails or generate malware/ransomware code. But on the other side of the coin, the tools can better educate users about security threats, identify bugs and vulnerabilities on websites faster, and help researchers in their security efforts. We chat with Etay Maor, an adjunct professor at Boston College and industry cybersecurity expert, about these key issues.
Years of security solutions have not made the Internet more secure, as reports of new attacks and data breaches occurring regularly. The issue is a broken system based on an incorrect assumption of what security is. Keith talks with Wes Kussmaul, CTO of The Authenticity Alliance, about how authenticity and better identification management can solve many of today’s security problems.
To help raise awareness about the types of tools hackers are using to eavesdrop or break into different systems, we chat with Etay Maor, an adjunct professor of cybersecurity at Boston College and an industry-recognized cybersecurity researcher. Knowing some of these tricks can help consumers and other professionals better secure their homes and offices. Guest: Etay Maor, adjunct professor of cybersecurity at Boston College, and industry-recognized cybersecurity researcher.
Artificial intelligence and its effect on cybersecurity (both good and bad) was one of the hottest topics at the annual Black Hat security conference in Las Vegas. Keith chats with security writer and editor Joan Goodchild about the biggest trends from the show.
CISO Joanna Burkey shares how HP, Inc. leverages a balanced, zero trust model that leans on modern tools and practices and diverse talent.
With more than 3 million cybersecurity roles estimated to be unfilled across the globe, security leaders must evolve their hiring and team development strategies. Learn what a smarter approach to recruitment and retention will mean for organizations.
XDR is one of security's buzziest acronyms—and for good reason. XDR, which stands for eXtended Detection and Response, promises to provide more timely and accurate threat detection by gathering and processing data from an integrated set of security tools. But it's early days yet and the market is changing rapidly, with different vendors offering not only different approaches but different definitions of XDR.
As enterprises build up their mobile, edge and cloud deployments, they're being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and networking in a cloud-delivered model. Learn what's driving demand for SASE, how SASE providers' capabilities differ, and the skills companies need to get started.
With more than 35,000 employees covering the insurance needs of more than 6 million members in Pennsylvania, Delaware, West Virginia and New York, Highmark Health is an independent licensee of the Blue Cross Blue Shield Association. CISO Omar Khawaja discusses Highmark's journey to trust-centric security and offers advice for taking this methodical approach for your organization.
Minneapolis-based Target Corporation serves guests at nearly 1,900 stores and at Target.com. Of all of the industries impacted severely by the pandemic, retail was one hit most drastically. Yet Target was one of those businesses that was able to transform swiftly in order to operate under these challenges. Rich Agostino, SVP and CISO, shares what he learned about security in that environment.
With 24,000 employees and customers in more than 100 countries, Rockwell Automation is a global leader in industrial automation and digital transformation. As industries rely more and more on operational technology (OT), they can be vulnerable if they don't consider critical security strategies. Learn more about the state of OT security from Rockwell VP and CISO Dawn Cappelli.
Celanese Corporation is a global chemical leader in the production of differentiated chemistry solutions and specialty materials used in most major industries and consumer applications. With IT and OT environments exposed to risk, the organization must build a unique ecosystem to secure and defend against attacks. Learn how CISO Jennifer Watson manages security complexity and velocity to minimize risks.
With more than 70,000 employees, BD is one of the largest global medical technology companies in the world and is advancing the world of health by improving medical discovery, diagnostics and the delivery of care. At BD, security spans a spectrum from enterprise IT, to products, manufacturing and services. Learn how CISO Rob Suárez manages the greatest risks in this environment, and what’s required to foster an ecosystem of trust across many stakeholders.
As AI deployments proliferate for better decision making, they also present risks across a large spectrum – from job displacement and socioeconomic inequality, to automated bias, to data poisoning, privacy violations, and AI threats used by bad actors. At the same time, AI itself is becoming an emerging and key ingredient for organizations to better defend against attack. Join us as we discuss how to put AI’s risks into perspective while leveraging AI for improved defenses.
With more than a half-million employees around the world, Accenture has a long history of supporting employees with technology as they visit clients. Those roots are what informed the organization’s traditional focus on the workstation, endpoint and identity -- rather than backhauling traffic through a VPN to maintain a corporate perimeter. Join us for this session to learn about how this approach is even further modernized with Zero Trust.
Join IDC analysts Brandon Butler and Christopher Rodriguez as they talk with Network World’s Ann Bednarz about the SASE model for streamlining network access and improving security. Deployed as a cloud service, it blends SD-WAN’s network optimization capabilities with security features such as zero-trust authentication, data loss prevention, threat detection, and encryption. Learn how SASE can offer easier network and security management, lower costs, and fewer vendors to manage.
Managing risk across an extended supply chain is extremely challenging for organizations of all sizes. The sheer volume of connected components that communicate, store, and process data will continue to expand the attack surface, and increase organizational risk. To address this, organizations need to understand their supply chain structure, the vulnerabilities that make it fragile, and which vulnerabilities present the highest risk. Join us for this session as we discuss these strategies and more with Randstad CISO Tami Hudson.
Cryptojacking is the unauthorized use of someone else’s computer to mine cryptocurrency. Hackers do this by either getting the victim to click on a malicious link in an email that loads cryptomining code on the computer or by infecting a website or online ad with JavaScript code that auto-executes once loaded in the victim’s browser. Learn more about cryptojacking and how to protect yourself from falling victim to an attack.
ADP’s Senior Director, ESI Business Security Office and Global Programs Omar Prunera leads the development of ADP’s Security Ambassadors for Excellence (S.A.F.E.) program to inform and train employees about security, improve their knowledge and behavior, and maintain the highest levels possible for ADP’s security posture. Join us to learn the benefits of the S.A.F.E. program up to present day, including the metrics framework designed to measure its impact, and where this project is headed.
Sponsored Links