‘You’ve Got the Job – Condolences!’

Operating Partner at Andreessen Horowitz Joel de la Garza on How to Prepare for Security Leadership The average tenure of a CISO can be brief – especially in the wake of a breach. What should security leaders do from day one to get a good handle on the job? Joel de la Garza, former CISO […]

Talking Security: How to Avoid the FUD Trap

Microsoft’s Diana Kelley on Data Integrity and How to Frame Security Issues It’s a quandary: How does one convey the urgency of cybersecurity without falling into the trap of spreading fear, uncertainty and doubt? Diana Kelley, cybersecurity field CTO at Microsoft, shares strategies. In a video interview at RSA Conference 2018, Kelley discusses: The growing data […]

Ashley Madison: The Breach Recovery

Ruby CISO Matthew Maglieri on How to Bounce Back From a High-Profile Breach The Ashley Madison breach of 2015 quickly became one the most famous of high-profile hacks. Three years later, CISO Matthew Maglieri discusses the breach recovery and what he refers to as “cybersecurity in a world of discretion.”In an interview at Information Security Media Group’s Dallas […]

‘Original Internet Godfather’ Opens Up on Crimes

Brett Johnson on Why He Turned From Committing Fraud to Fighting It Brett Johnson stole millions in a fraud career that made him one of the FBI’s most wanted criminals. But now he’s sharing his secrets to help organizations fight fraud. Why the change of heart? In an interview at Information Security Media Group’s recent Dallas Fraud and […]

Threat Intelligence and the Power of Attribution

Arbor’s Paul Bowen on Where Organizations Miss the Mark with Threat Intel Most organizations are good at collecting threat intelligence, but they struggle to operationalize it – and especially to use it for threat attribution. Arbor Network’s Paul Bowen tells where organizations are commonly missing the mark. Bowen talks about how to maximize threat intelligence […]

Ratings’ Role in Vendor Risk Management

SecurityScorecard’s Sam Kassoumeh on How to Improve Vendor Assessments and Results From GDPR to the NIST Cybersecurity Framework, vendor risk management is a key component of every new piece of cybersecurity guidance. Yet, security leaders still struggle to inventory and assess their strategic partners. Sam Kassoumeh of SecurityScorecard explores the challenges. In an interview at […]

Security Readiness: How Do You Stack Up?

Intel’s David Houlding on the Value of Benchmarking Tool and Data Looking for a way to benchmark your cybersecurity organization against those of your peers? Intel Health and Life Sciences and its partners offer a Healthcare Security Readiness program that provides a benchmarking opportunity, David Houlding explains. In an interview at Information Security Media Group’s […]

A Common Sense Guide to Mitigating Insider Threats

Randy Trzeciak of CERT Reviews the Latest Research Randy Trzeciak of Carnegie Mellon University’s CERT describes the latest edition of the group’s common sense guide to mitigating insider threats and offers an update on his latest research. In a video interview at RSA Conference 2017, Trzeciak: Highlights changes in the new common sense guide; Discusses […]

Gartner’s Avivah Litan on Attribution and Elections

Analyst Offers Insights on Technologies to Improve Digital Attribution and Voter Authentication As threats and threat actors multiply and evolve, digital attribution becomes ever more critical, says Gartner’s Avivah Litan. She discusses how to approach attribution and also offers her take on the technologies that could help secure U.S. elections. In an interview at Information […]

How Cybercriminals Use Facebook

RSA’s Daniel Cohen Describes Use of Social Media to Sell Stolen Cards A new report from threat researchers at RSA describes how cybercriminals are using social media, including Facebook, to not only network about their attacks, but also sell card data and other compromised consumer information – all in open, public forums. Daniel Cohen, head […]