As data breaches continue to occur, cyber attackers have demonstrated enhanced technical sophistication in the area of distributed-denial-of-service (DDoS) attacks. DDoS accounted for more than 55% of the overall annual cybercrime costs per organizations.
President Obama released the NIST Cybersecurity Framework, formally known as “Framework for Improving Critical Infrastructure Security.” The development of the Framework was initiated by the Executive Order 13636 with an aggressive timeline of less than one-year to create a framework to reduce cybersecurity risk and improve security of critical infrastructures.
Every organizations wants to reduce risk, prevent incidents, and in the event they do happen, to react with speed. But in IT security the requirements, and failures associated with lack of integration, are often less obvious.
Today’s Chief Information Security Officers (CISOs) are asking themselves, “How can we benefit from mobile and cloud technology – securely?” Risk and Security Officers are often placed in the role of public defender for corporations. They are charged with proactively protecting the enterprise from a variety of cyber threats while the business continues to evolve. This broad responsibility becomes even more challenging when companies adopt new technology without a security strategy.
Cyber attacks, mobility, cloud, and compliance have raised security concerns with CISOs and are now a prominent topic of boardroom conversations. And like it or not, the CISO is accountable to all these stakeholders, with the responsibility of having the right balance of technology and business skills in place. Here are a few strategies that will keep security leaders in good standing with the Board.
IBM is announcing that it is adding nine schools to its more than 200 partnerships with universities around the globe, focusing on collaborating to bring cyber security skills to the classroom. University of Texas at Dallas is applying IBM resources to develop cyber security courses and curriculum in areas such as cloud computing, mobile computing and cyber operations. Furthermore, Dr. Bhavani Thuraisingham, Executive Director of the Cyber Security Research and Education Institute (CSI) at UT Dallas, is recipient of a 2013 IBM Faculty Award for establishing new courses, such as secure cloud computing, data mining for malware detection and cyber operations.
Many companies and security leaders are having the same challenge around getting sufficient commitment from their Chief Executive Officer (CEO). CEOs have a lot on their plate already and the cyber risk may at first glance look too tactical for a board room discussion.
Being in charge of security for almost any organization is a stressful job. Every day there are more and more headlines about data breaches, the loss of intellectual property, targeted attacks and the list goes on. Here are nine reasons why your security leader might just need a hug.
October is National Cybersecurity Awareness Month. We want to encourage you and your employees to participate and act as cybersecurity ambassadors in your communities to encourage safe computing habits.
Social media and phishing exploits are going to get more sophisticated. Cyber attackers are exploiting influence tactics to create trust and risk. A look behind six psychological elements behind sophisticated cyber attacks.