Campaign URL
Copy
Twitter
0
tweets
Subscribe
Past Issues
RSS
Translate
English
العربية
Afrikaans
беларуская мова
български
català
中文(简体)
中文(繁體)
Hrvatski
Česky
Dansk
eesti keel
Nederlands
Suomi
Français
Deutsch
Ελληνική
हिन्दी
Magyar
Gaeilge
Indonesia
íslenska
Italiano
日本語
ភាសាខ្មែរ
한국어
македонски јазик
بهاس ملايو
Malti
Norsk
Polski
Português
Português - Portugal
Română
Русский
Español
Kiswahili
Svenska
עברית
Lietuvių
latviešu
slovenčina
slovenščina
српски
தமிழ்
ภาษาไทย
Türkçe
Filipino
украї́нська
Tiếng Việt
Cybersecurity Leadership
by
JC Gaillard
Powered by
When Tech Is The Target: Cyber Risks For Tech Firms
From
www.cxotoday.com
-
Today, 07:31
In a world in which cyber attacks are increasing in frequency and severity, companies rely heavily on technology to secure their data and systems. But what if your company is a tech company? What are the risks if your business model is to create business applications, cloud services, or even cyber security products?
How to marry security with digital transformation: 4 best practices
From
enterprisersproject.com
-
31 May, 07:06
Organizations that make security an integral part of digital transformation plans gain a competitive advantage, PwC research shows
How to Win the Trust of Regulators, Customers and Other Stakeholders When the GDPR Honeymoon Ends
From
www.cpomagazine.com
-
28 May, 06:58
One year on, a collective phew can be heard. The bark of GDPR’s 57,509 weighty words appear distinctly worse than their bite.
One Year Later - Has GDPR Really Been that Big of a Deal?
From
insights.comforte.com
-
26 May, 07:37
Now that GDPR has been in effect for a year, let’s take a look at what’s happened thus far and see if all the panic was warranted.
Digital transformation could be causing security risk
From
www.techradar.com
-
24 May, 07:09
Only half of organizations believe their digital transformation deployments are secure
Why are we still facing so many security products and vendors?
From
corixpartners.com
-
23 May, 07:09
Products consolidation and integration become key factors, as the "when-not-if” paradigm around cyber attacks takes centre-stage with senior executives
Companies' Stock Value Dropped 7.5% after Data Breaches
From
www.infosecurity-magazine.com
-
22 May, 07:16
Publicly traded companies suffered an average drop of 7.5% in their stock values and a mean market cap loss of $5.4 billion per company, and it reportedly took 46 days, on average, for those stock prices to return to their pre-breach levels. To date, the stock price of Equifax has not yet recovered
Why Are Businesses Struggling to Fill Cybersecurity Vacancies?
From
www.cpomagazine.com
-
19 May, 07:06
Cybersecurity vacancies are hard to fill as companies are hiring from a pool which is not growing quick enough to meet demand, a phenomenon attributed to growing cybercrime economy and lack of extensive education to produce professionals.
The Marriott Breach Shows Just How Inadequate Cyber Risk Disclosures Are
From
hbr.org
-
14 May, 07:10
The Marriott breach offers four takeaways that can be useful to both senior managers and regulators
Is OT Cybersecurity Better Bolted-On or Designed-In?
From
iiot-world.com
-
12 May, 08:22
A cybersecurity solution in business IT, often requiring the use of active components and intrusive techniques, may be highly unsuitable for industrial systems and networks. Not only will it fail to recognize specific industrial protocols and interactions.
Protecting Data Privacy in a Data-Sharing World
From
www.cio.com
-
9 May, 08:07
There are compelling reasons for organizations to share data. The challenge is to enable data sharing in a way that protects the privacy of users’ personal information.
Le RSSI, un chef d’orchestre… sans orchestre ?
From
www.lemagit.fr
-
7 May, 07:34
Selon une étude Clusif , les responsables de la sécurité des systèmes d’information (rssi) semblent encore en peine de faire progresser la maturité de leurs entreprises en la matière. Mais ils ne paraissent guère bien dotés en moyens pour cela.
Supporting neurodiversity in cybersecurity
From
www.itproportal.com
-
2 June, 07:02
Neurodiversity recognises our brains interact in different ways, which can create challenges, but also advantages.
Five Things To Consider When Reporting To Your Board On Cybersecurity
From
www.forbes.com
-
29 May, 07:13
Responsibility to report and disclose on cybersecurity will only continue to expand.
GDPR After One Year: Costs and Unintended Consequences
From
truthonthemarket.com
-
27 May, 07:23
GDPR is officially one year old. How have the first 12 months gone? As you can see from the mix of data and anecdotes below, it appears that compliance costs have been astronomical; individual “data rights” have led to unintended consequences; “privacy protection” seems to have undermined market competition; and there have been large unseen — but not unmeasurable! — costs in foregone startup investment. So, all-in-all, about what we expected.
Moody's downgrades Equifax outlook to negative, cites cybersecurity
From
www.cnbc.com
-
25 May, 07:35
Moody's said it's downgrading the outlook for Equifax from stable to negative, citing ongoing fallout from the company's 2018 data breach.
An effective cybersecurity strategy for an ICS environment should apply a layered protection
From
iiot-world.com
-
23 May, 07:20
There are two sides to the cybersecurity fence when addressing threats and other concerns. The first side is IT. The other side is OT.
Equifax Has Spent Nearly $1.4bn on Breach Costs
From
www.infosecurity-magazine.com
-
22 May, 07:29
The credit agency claimed in its Q1 2019 earnings statement that the figure “related to the incident, incremental technology and data security costs, and an accrual for losses associated with legal proceedings and investigations.”
After 2 Years, WannaCry Remains a Threat
From
www.bankinfosecurity.com
-
20 May, 06:59
While the immediate dangers associated with WannaCry have faded, the ransomware still lurks, and many systems have not been patched to prevent exploits
Public Private Partnerships And The Cybersecurity Challenge Of Protecting Critical Infrastructure
From
www.forbes.com
-
14 May, 07:17
Strong public/private partnerships are required in operating/protecting the U.S. critical infrastructure. Most defense, oil/gas, electric power grids, health care, utilities, communications, transportation, education, banking/finance is owned by the private sector yet regulated by the public sector.
Operationalizing Cybersecurity: Evolution, Seamlessness And Holistic Thinking As Key Drivers
From
www.forbes.com
-
14 May, 07:06
Operationalizing cybersecurity is an ongoing process; it must evolve all the time.
CISOs, Stop Focusing On Cybersecurity
From
www.forbes.com
-
12 May, 08:12
We must set our focus on a business-first approach and use our cybersecurity skills to reduce business risk.
Cyber Security & the Cloud: Welcome back to the “Trust-But-Verify” era…
From
corixpartners.com
-
9 May, 07:35
For regulated industries, blind trust will never be enough; being able to demonstrate a degree of due-diligence on key vendors will always be essential
Revitalizing privacy and trust in a data-driven world
From
www.pwc.com
-
6 May, 07:07
Drawing on results of their GSISS survey and beyond, PwC offer nine points on how businesses can better manage rising risks to data privacy and security.
This email was sent to
<<Email Address>>
why did I get this?
unsubscribe from this list
update subscription preferences
Corix Partners · 269 Farnborough Road · Farnborough, Hampshire GU14 7LY · United Kingdom