Cybersecurity Leadership
21.0K views | +1 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

Insider Threat Awareness - one click is all it takes….

Insider Threat Awareness - one click is all it takes…. | Cybersecurity Leadership | Scoop.it

Organisations need to have a comprehensive security program in place that focuses on both preparedness and visibility.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The ransomware crisis is getting worse. We need to make these four big changes

The ransomware crisis is getting worse. We need to make these four big changes | Cybersecurity Leadership | Scoop.it
Tough decisions are needed to stop the ransomware problem. But that will mean some big and difficult changes.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Keeping Data Safe Starts with Tackling Insider Threats

Keeping Data Safe Starts with Tackling Insider Threats | Cybersecurity Leadership | Scoop.it

Data is Under Siege While most people think of external threats like malware when they think of data loss, they are not the only threat. The threat from an organisation’s own employees is often bigger than the threat from external cybercriminals.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security

Smarter Devices, Smarter Fraud: Overlooked Threats in IoT Security | Cybersecurity Leadership | Scoop.it

Many manufacturers of connected devices fail to recognize the IoT security implications of customers tinkering with their products.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why The Cybersecurity Skills Gap Won't Be Solved In The Classroom

Why The Cybersecurity Skills Gap Won't Be Solved In The Classroom | Cybersecurity Leadership | Scoop.it
The way cybersecurity talent is taught cannot match the evolving threat landscape.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Hackers Stole Over $4 Billion From Crypto Crimes In 2019 So Far, Up From $1.7 Billion In All Of 2018

Hackers Stole Over $4 Billion From Crypto Crimes In 2019 So Far, Up From $1.7 Billion In All Of 2018 | Cybersecurity Leadership | Scoop.it

Although exchanges, wallets, and other cryptocurrency custody services are strengthening their defenses, hackers continue to innovate and outpace even the current state of the art in cybersecurity

No comment yet.
Scooped by JC Gaillard
Scoop.it!

After 2 Years, WannaCry Remains a Threat

After 2 Years, WannaCry Remains a Threat | Cybersecurity Leadership | Scoop.it

While the immediate dangers associated with WannaCry have faded, the ransomware still lurks, and many systems have not been patched to prevent exploits

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Inside jobs – Protecting your organisation from the cyber threat within

Inside jobs – Protecting your organisation from the cyber threat within | Cybersecurity Leadership | Scoop.it
In the real world of IT, threats emanating from inside organisations, not hackers, account for around three-quarters of all recorded threat instances.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

How a Cyber Attack Could Cause the Next Financial Crisis

How a Cyber Attack Could Cause the Next Financial Crisis | Cybersecurity Leadership | Scoop.it

Criminals have always sought ways to infiltrate financial technology systems. Now, the financial system faces the added risk of becoming collateral damage in a wider attack on critical national infrastructure

No comment yet.
Scooped by JC Gaillard
Scoop.it!

A False Sense of Security

A False Sense of Security | Cybersecurity Leadership | Scoop.it

The ISF releases its "Threat Horizon 2020" > Emerging threats over the next two years stem from biometrics, regulations, and insiders.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The Untold Story of NotPetya, the Most Devastating Cyberattack in History

The Untold Story of NotPetya, the Most Devastating Cyberattack in History | Cybersecurity Leadership | Scoop.it
Crippled ports. Paralyzed corporations. Frozen government agencies. How a single piece of code crashed the world.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Unpicking the cyber-crime economy

Unpicking the cyber-crime economy | Cybersecurity Leadership | Scoop.it
Apple iPhones, expensive cars and high-end houses are all ways cyber-thieves try to cash out.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

How to Structure an Enterprise-Wide Threat Intelligence Strategy

How to Structure an Enterprise-Wide Threat Intelligence Strategy | Cybersecurity Leadership | Scoop.it
To keep an organization safe, you must think about the entire IT ecosystem.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Ransomware: Cyber-insurance payouts are adding to the problem, warn security experts

Ransomware: Cyber-insurance payouts are adding to the problem, warn security experts | Cybersecurity Leadership | Scoop.it
"It seems like a fix but it really isn't". Paying the ransom might be the cheapest short-term option to get your data back, but it causes long-term problems.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Is Your Ransomware Incident Response Plan Future-Proof?

Is Your Ransomware Incident Response Plan Future-Proof? | Cybersecurity Leadership | Scoop.it
Even amongst organizations that have built a formal cybersecurity incident response plan, only about a third have playbooks for specific types of attacks
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The smart tech threat to CEOs

The smart tech threat to CEOs | Cybersecurity Leadership | Scoop.it

Keeping a business secure means more than just the CEO having antivirus software installed on their PC

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Sizing Up Your Cyberrisks

Sizing Up Your Cyberrisks | Cybersecurity Leadership | Scoop.it
Focus first on the threats to your key activities—not on the technology itself.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Insider Threats: Root Causes and Mitigation Practices

Insider Threats: Root Causes and Mitigation Practices | Cybersecurity Leadership | Scoop.it
Insider threats arise from two kinds of employees: the negligent and those with malicious intent. Knowing the root causes is critical to mitigation.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

CISOs Must Evolve to a Data-First Security Program

CISOs Must Evolve to a Data-First Security Program | Cybersecurity Leadership | Scoop.it
Such a program will require effort and reprioritization, but it will let your company fight modern-day threats and protect your most important assets.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cybercriminals are using blockchain to improve security. Should you?

Cybercriminals are using blockchain to improve security. Should you? | Cybersecurity Leadership | Scoop.it
Business-minded hackers are testing blockchain technologies to secure their illegal operations. Here's what enterprises can learn from them.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Insider Threat: The Human Element of Cyber Risk

Insider Threat: The Human Element of Cyber Risk | Cybersecurity Leadership | Scoop.it
Cyber programs often miss the significant portion of risk generated from within, and tools for insider threat are blunt instruments. A new method can yield better results.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Why Asia Has the Cybersecurity Advantage

Why Asia Has the Cybersecurity Advantage | Cybersecurity Leadership | Scoop.it
A new ranking shows how companies around the world are actually faring in the fight to protect data from cybercriminals.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The most important attributes of a cybersecurity platform

The most important attributes of a cybersecurity platform | Cybersecurity Leadership | Scoop.it
A cybersecurity platform should have coverage across major threat vectors, central management, and technologies for prevention, detection, and response in any security platform.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Better safe than sorry: How to deal with growing cyber-security threats

Better safe than sorry: How to deal with growing cyber-security threats | Cybersecurity Leadership | Scoop.it
Viruses, ransomware, Trojan horses and state-sponsored cyber attacks The variety and sophistication of cyber-security threats to businesses and government organisations of all sizes are increasing. It’s not just the financial cost of cyber crime, which costs businesses about $600 billion globally, according to one estimate. It’s also the damage to an organisation’s reputation when it emerges that it has been hacked, or lost customer data. Vital public services are also vulnerable, and more than a third of NHS trusts in England were disrupted by the WannaCry ransomware attack in 2017. The sheer number of cyber threats can seem overwhelming, even
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Can Anything Stop Cyber Attacks?

Can Anything Stop Cyber Attacks? | Cybersecurity Leadership | Scoop.it
The U.S. must wake up to the seriousness of cyber attacks on its economy and way of life, experts said at the Penn Wharton Budget Model’s Policy Forum.
No comment yet.