As companies align cyber with business needs, the BISO's time has come
https://www.scmagazine.com/home/security-news/network-security/everybody-wants-a-unicorn-as-companies-seek-to-align-cyber-with-business-enter-the-biso/
https://www.scmagazine.com/home/security-news/network-security/everybody-wants-a-unicorn-as-companies-seek-to-align-cyber-with-business-enter-the-biso/
SC Media
As companies align cyber with business needs, the BISO's time has come
The way organizations define and deploy BISOs (business information sescurity officers) depends how complex, risk-averse and regulated their business is.
Эксперты спрогнозировали дефицит специалистов по кибербезопасности :: Технологии и медиа :: РБК
https://www.rbc.ru/technology_and_media/02/11/2020/5f9c494a9a7947a702aa761f
https://www.rbc.ru/technology_and_media/02/11/2020/5f9c494a9a7947a702aa761f
РБК
Эксперты спрогнозировали дефицит специалистов по кибербезопасности
В условиях массового перехода на удаленку компании по всему миру намерены расширять штат специалистов в области кибербезопасности. Но это уже в 2021-м увеличит дефицит таких работников
TaoSecurity: Security and the One Percent: A Thought Exercise in Estimation and Consequences
https://taosecurity.blogspot.com/2020/10/security-and-one-percent-thought.html?m=1
https://taosecurity.blogspot.com/2020/10/security-and-one-percent-thought.html?m=1
Blogspot
Security and the One Percent: A Thought Exercise in Estimation and Consequences
Richard Bejtlich's blog on digital security, strategic thought, and military history.
Global Digital Trust Insights 2021: PwC
https://www.pwc.com/gx/en/issues/cybersecurity/digital-trust-insights.html
https://www.pwc.com/gx/en/issues/cybersecurity/digital-trust-insights.html
PwC
New world, new rules: Cybersecurity in an era of uncertainty - The C-suite playbook
Check out the latest findings from PwC’s 2026 Global Digital Insights Survey, reflecting the views of over 3,800 executives.
Forwarded from Андрей
Кодекс практики обеспечения кибербезопасности и безопасности в машиностроении
Институт инженерии и технологии опубликовал Кодекс практики при поддержке NCSC.
https://electrical.theiet.org/guidance-codes-of-practice/publications-by-category/cyber-security/code-of-practice-cyber-security-and-safety/
Институт инженерии и технологии опубликовал Кодекс практики при поддержке NCSC.
https://electrical.theiet.org/guidance-codes-of-practice/publications-by-category/cyber-security/code-of-practice-cyber-security-and-safety/
electrical.theiet.org
Code of Practice: Cyber Security and Safety
This Code of Practice is written for engineers and engineering management to support their understanding of the issues involved in ensuring that the safety responsibilities of an organization are addressed, in the presence of a threat of cyber attack. “If…
3 Themes Emerge From the Gartner Hype Cycle for Midsize Enterprise, 2020
https://www.gartner.com/smarterwithgartner/3-themes-emerge-from-the-gartner-hype-cycle-for-midsize-enterprise-2020/
https://www.gartner.com/smarterwithgartner/3-themes-emerge-from-the-gartner-hype-cycle-for-midsize-enterprise-2020/
Gartner
3 Themes Emerge From the Gartner Hype Cycle for Midsize Enterprise, 2020
Gartner analyst Mike Cisek shares the 3 themes from the Gartner Hype Cycle for #Midsize Enterprises, 2020. Read more. #CIO #MSE #Trends #Productivity @Gartner_IT
"... Risk-based security: Trends related to remote worker and edge infrastructure have accelerated the need to strengthen security and simplify how IT teams deliver it. Risk-based security allows CIOs to focus on high-priority areas of risk in an efficient and cost-effective way. ...."
Cybersecurity Risk Checklist for CFOs to Manage Increase in Remote Finance
https://www.gartner.com/smarterwithgartner/the-cfo-cybersecurity-risk-checklist/
https://www.gartner.com/smarterwithgartner/the-cfo-cybersecurity-risk-checklist/
Gartner
Cybersecurity Risk Checklist for CFOs to Manage Increase in Remote Finance
CFOs must understand a new type of financial risk management related to cybersecurity risk because so many finance activities are now conducted remotely.
Differential Privacy Blog Series | NIST
"We have developed this blog series leveraging the differential privacy contributions in the de-identification tools section."
https://www.nist.gov/itl/applied-cybersecurity/privacy-engineering/collaboration-space/focus-areas/de-id/dp-blog
"We have developed this blog series leveraging the differential privacy contributions in the de-identification tools section."
https://www.nist.gov/itl/applied-cybersecurity/privacy-engineering/collaboration-space/focus-areas/de-id/dp-blog
It’s easier to trust a cloud provider that enables you to trust them less | Google Cloud Blog
https://cloud.google.com/blog/products/identity-security/trust-a-cloud-provider-that-enables-you-to-trust-them-less
https://cloud.google.com/blog/products/identity-security/trust-a-cloud-provider-that-enables-you-to-trust-them-less
Google Cloud Blog
It’s easier to trust a cloud provider that enables you to trust them less | Google Cloud Blog
Cloud providers should build technologies that allow organizations to benefit from cloud computing while decreasing the amount of trust they need to place into the provider themselves.