HackDig : Dig high-quality web security articles for hackers

Shift Your Cybersecurity Mindset to Maintain Cyber Resilience

As the business world navigates the ups and downs of today’s economy, a mindset shift is required to maintain cyber resilience. Cybersecurity, often an afterthought in a strong economy, must not be neglected in responding to shifts in the business landscape. As more companies expand their remote workforce, the number of endpoints with access to corpora
Publish At:2020-06-04 12:22 | Read:266 | Comments:0 | Tags:Data Protection Identity & Access Business Continuity C-Suit

How Cybersecurity Leaders Can Chart the Seas of Business Communication

As organizations prepare for the remainder of 2020, cybersecurity leaders can use this opportunity to review their communication style and improve how they share key messages across the organization. Taking time to refine business communication can help those in security and technical leadership roles heighten the effectiveness of their messaging and ensure
Publish At:2020-06-03 09:20 | Read:164 | Comments:0 | Tags:CISO Business Continuity C-Suite Chief Information Security

Measuring the Effectiveness of AI in the SOC

In a previous blog post, I covered some of the challenges encountered by security operations centers (SOCs) and how leveraging artificial intelligence (AI) can help alleviate these challenges, including the cybersecurity skills shortage, unaddressed security risks and long dwell times. According to ISACA’s State of Cybersecurity Report, 78 percent of r
Publish At:2020-05-24 06:18 | Read:301 | Comments:0 | Tags:Artificial Intelligence Artificial Intelligence (AI) Busines

What Leadership Qualities for CISOs Are Most Important in 2020?

Organizations today have to balance the need for continuous evolution along the digital continuum with the need to protect their data and operations and keep cyber risk at an acceptable level. The chief information security officer (CISO) role is uniquely positioned to help organizations manage those dualities, but it requires a different set of leadership q
Publish At:2020-02-09 10:30 | Read:490 | Comments:0 | Tags:CISO digital trust Business Continuity C-Suite Chief Informa

Stay Calm, Your Incident Response Is Ready

Historically speaking, having a plan of attack has gotten a bad rap. Helmuth von Moltke the Elder, who famously said, “No plan survives contact with the enemy,” shared that sentiment with a predecessor in war, Napoleon Bonaparte, who said, “I never had a plan of operations.” Eisenhower warmed up to planning a bit: “In preparing
Publish At:2019-10-18 10:20 | Read:1184 | Comments:0 | Tags:Incident Response C-Suite Cost of a Data Breach Cyber Resili

Discover the secrets of the SOC

Presentation on building effective SOCs (as given at InfoSec Europe 2019 on the interactive workshop track). Simon Crocker, Cisco’s EMEAR lead for SOC Advisory looks at what goes into making a SOC work effectively. This talk discusses the core SOC requirements around monitoring and incident response function, but also touches on some of the other serv
Publish At:2019-09-19 17:35 | Read:1016 | Comments:0 | Tags:Presentations blue team C-Suite conference InfoSec Europe SO

Is that really you? The importance of identity in breach response and recovery

Presentation on Zero Trust and the importance of identity in breach response and recovery (as given at InfoSec Europe 2019 on the tech talk track). Richard Dean, Cisco’s EMEAR Head Of Security Advisory Services looks at Cisco’s approach to zero trust. This talk discusses the need to monitoring your users’ access and privileges and how securing t
Publish At:2019-09-19 17:35 | Read:1144 | Comments:0 | Tags:Presentations blue team C-Suite conference incident response

Security Engineering – A manifesto for defensive security

Presentation on the need to re-examine how we engineer systems (taking service providers as an example) and the implications on how we quantify cyber risk if we want to take this message into the board room (as given at BT’s SnoopCon 2019 and Cisco’s June 2019 Knowledge Network webinar for service providers). Having delivered security consultancy
Publish At:2019-09-19 17:35 | Read:1043 | Comments:0 | Tags:Presentations C-Suite conference CRQ cyber risk quantificati

Don’t Panic! Create a Winning Cybersecurity Strategy to Preserve CISO Sanity

Stress comes with the territory for chief information security officers (CISOs). As noted by Medium, the job is unpredictable, with “long periods of preparing, watching, waiting, punctuated by periods of high stress and occasional bruising.” As both vendors and cyberthreats proliferate, finding a balance between an effective cybersecurity strateg
Publish At:2017-10-31 05:50 | Read:3702 | Comments:0 | Tags:CISO Automation C-Suite Chief Information Security Officer (

Don’t Let Organizational Politics Derail Security Initiatives

Information security is vastly complex, both technically and from a governance, risk and compliance (GRC) perspective. When workplace politics come into play, security best practices become more complicated and risk management is weakened significantly. Security professionals commonly meet resistance when they attempt to implement IT initiatives that do not
Publish At:2017-10-22 05:00 | Read:3550 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Execu

Sink or Swim: Uniting the C-Suite, Sales and Security to Fight Advanced Cyberattacks

One of the most disturbing security trends over the last few years has been the rise of the meta attack. The scope of this type of attack is far larger and wider than a threat designed to achieve a specific goal. These advanced cyberattacks are so significant, in fact, that they could sink an entire organization if it doesn’t take the time to install l
Publish At:2017-10-06 10:25 | Read:3326 | Comments:0 | Tags:CISO Incident Response Risk Management Advanced Attacks Adva

Fasten Your Seat Belt: Accelerating Your Digital Transformation Through Collaboration

When I think about my family vacations from childhood, I remember camping trips, hours on the beach, sharing stories around the campfire and the fun my siblings and I used to have in the back seat of the car — jumping on each other, switching seats and hopping from the third row into the front seat. Half the fun was enabled by the fact that we had no seat be
Publish At:2017-10-04 21:35 | Read:3515 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Cyber

National IT Professionals Day: Recognizing the Saintly Patience of IT Workers

Sept. 19 is National IT Professionals Day, which got off the ground two years ago as a way to recognize and celebrate all the work, worry and downright wacky things that happen to IT professionals. For chief information security officers (CISOs), the event offers a chance to step back, take a hard look at teams and give credit where credit is due. With the i
Publish At:2017-09-19 12:00 | Read:4481 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Profe

No Time for Techno-Babble: Four Key Traits of Quality CISO Reports

Board directors have very little patience for technical jargon. Given the tremendous pressure executives are under to avoid headline-grabbing data breaches, CISO reports should align enterprise risks with their potential impacts on business objectives in terms that nontechnical board members can easily understand. An EY report titled “The Evolving Role
Publish At:2017-09-18 17:25 | Read:5918 | Comments:0 | Tags:CISO Risk Management C-Suite Chief Information Security Offi

The New CISO: Management Through Thought Leadership

CISOs have a difficult path to success because their area of expertise is highly technical and one that few care to understand on a deep level. The success of today’s IT security leaders depends on their thought leadership and ability to present a continuous flow of understandable and interesting information that informs colleagues without jargon or fe
Publish At:2017-09-14 21:10 | Read:9655 | Comments:0 | Tags:CISO C-Suite Chief Information Security Officer (CISO) Execu

Announce

Share high-quality web security related articles with you:)

Tools