Cybersecurity Leadership
21.0K views | +16 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

Are You Ready to Protect Your Company From Insider Threats? Probably Not

Are You Ready to Protect Your Company From Insider Threats? Probably Not | Cybersecurity Leadership | Scoop.it
The bad news is insider threats are on the rise. The worse news is that most companies are unprepared to meet the moment.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Insider risks are getting increasingly costly

Insider risks are getting increasingly costly | Cybersecurity Leadership | Scoop.it
The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

‘Shadow’ AI use becoming a driver of insider cyber risk

‘Shadow’ AI use becoming a driver of insider cyber risk | Cybersecurity Leadership | Scoop.it
Off-the-books use of generative AI tools will inevitably lead to a costly, high-profile data breach for someone, but a little attention paid to appropriate data management policy can help mitigate the risk.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Insider risk management: Where your program resides shapes its focus

Insider risk management: Where your program resides shapes its focus | Cybersecurity Leadership | Scoop.it
Choosing which department should be responsible for protecting an organization from threats from within isn’t always straightforward.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Re-evaluating immature and ineffective insider risk management programs

Re-evaluating immature and ineffective insider risk management programs | Cybersecurity Leadership | Scoop.it
CISOs are re-evaluating the approaches, technologies, and processes they have in place for managing insider risk and dealing with a threat.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Who is your biggest insider threat?

Who is your biggest insider threat? | Cybersecurity Leadership | Scoop.it
Phishing simulations aren't enough for identifying your organization’s most vulnerable insiders or minimizing their risk.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

There’s a Thin Line Between Malicious Insiders and External Attackers

There’s a Thin Line Between Malicious Insiders and External Attackers | Cybersecurity Leadership | Scoop.it

Security in the past followed a castle-and-moat approach. But the cloud, digital transformation and the pandemic moved digital assets far and wide. Now a thief could be right next to the king’s treasury, and an enterprise would have no idea.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Insider Threats: Root Causes and Mitigation Practices

Insider Threats: Root Causes and Mitigation Practices | Cybersecurity Leadership | Scoop.it
Insider threats arise from two kinds of employees: the negligent and those with malicious intent. Knowing the root causes is critical to mitigation.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Insider threats will dominate cybersecurity trends in 2019

Insider threats will dominate cybersecurity trends in 2019 | Cybersecurity Leadership | Scoop.it
Not only are insider-lead breaches on the rise, but they’re getting more diverse and sophisticated.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The Case for a Human Security Officer

The Case for a Human Security Officer | Cybersecurity Leadership | Scoop.it
Wanted: a security exec responsible for identifying and mitigating the attack vectors and vulnerabilities specifically targeting and involving people.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Insider Threat: The Human Element of Cyber Risk

Insider Threat: The Human Element of Cyber Risk | Cybersecurity Leadership | Scoop.it
Cyber programs often miss the significant portion of risk generated from within, and tools for insider threat are blunt instruments. A new method can yield better results.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

A better security strategy than ‘know your enemy’: Know your co-workers

A better security strategy than ‘know your enemy’: Know your co-workers | Cybersecurity Leadership | Scoop.it
Something as simple as an uncharacteristic turn of phrase can clue people into an email’s illegitimacy.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Insiders and outsiders: Why cybersecurity strategies need to look all ways

Insiders and outsiders: Why cybersecurity strategies need to look all ways | Cybersecurity Leadership | Scoop.it

Comprehensive visibility, employee awareness, proactive threat hunting and actionable threat intelligence are indispensable pillars of a robust cybersecurity strategy and just a few areas that organizations should keep in mind as they build their cybersecurity resilience

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Five Questions to Ask About Your Employee Offboarding Process

Five Questions to Ask About Your Employee Offboarding Process | Cybersecurity Leadership | Scoop.it
Recent research shows that one third of enterprises lose more than 10% of their associated technology assets when offboarding workers, and 42% experience unauthorized access to SaaS applications and cloud resources.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Your Biggest Cybersecurity Risks Could Be Inside Your Organization

Your Biggest Cybersecurity Risks Could Be Inside Your Organization | Cybersecurity Leadership | Scoop.it

Today more than 300 million people are working remotely — creating, accessing, sharing, and storing data wherever they go — and data breaches arising from insider threats and simple mishaps can cost businesses an average of $7.5 million annually. Ultimately it doesn’t matter if a breach is intentional or accidental. Insider risk programs should be part of every company’s security strategy.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

The hidden security risks in tech layoffs and how to mitigate them

The hidden security risks in tech layoffs and how to mitigate them | Cybersecurity Leadership | Scoop.it
Layoffs can be tough for both companies and employees. When grappling with anger, fear, and uncertainty, it's hard for anyone to be at their best. Here are some strategies for avoiding negative outcomes during layoffs.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Insider Threat Awareness - one click is all it takes….

Insider Threat Awareness - one click is all it takes…. | Cybersecurity Leadership | Scoop.it

Organisations need to have a comprehensive security program in place that focuses on both preparedness and visibility.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

You’re Not Paranoid – Not Preparing for Insider Threats Puts Your Data at Risk

You’re Not Paranoid – Not Preparing for Insider Threats Puts Your Data at Risk | Cybersecurity Leadership | Scoop.it
It’s beyond time to ask an uncomfortable question: are your employees your biggest defense or greatest vulnerability against insider threats? How well you defend your data depends on getting this question right.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Keeping Data Safe Starts with Tackling Insider Threats

Keeping Data Safe Starts with Tackling Insider Threats | Cybersecurity Leadership | Scoop.it

Data is Under Siege While most people think of external threats like malware when they think of data loss, they are not the only threat. The threat from an organisation’s own employees is often bigger than the threat from external cybercriminals.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cyber Crime Widely Underreported Says ISACA 2019 Annual Report on Cyber Security Trends

Cyber Crime Widely Underreported Says ISACA 2019 Annual Report on Cyber Security Trends | Cybersecurity Leadership | Scoop.it
Recent 2019 ISACA annual report shows key interesting cyber security trends which includes underreporting of cyber crimes and internal employees being the third-greatest security threat.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

To Reduce IT Supply Chain Risk, Watch for Insider Threats and External Attackers

To Reduce IT Supply Chain Risk, Watch for Insider Threats and External Attackers | Cybersecurity Leadership | Scoop.it

The idea that a supply chain attack could compromise hardware used to power critical systems has troubled the public and private sectors alike for several years.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Inside jobs – Protecting your organisation from the cyber threat within

Inside jobs – Protecting your organisation from the cyber threat within | Cybersecurity Leadership | Scoop.it
In the real world of IT, threats emanating from inside organisations, not hackers, account for around three-quarters of all recorded threat instances.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

7 insider attacks behavior analytics detects

7 insider attacks behavior analytics detects | Cybersecurity Leadership | Scoop.it
Frequent types of commonly executed insider attacks UEBA detects.
No comment yet.