Cybersecurity Leadership
21.0K views | +0 today
Follow
Cybersecurity Leadership
A reference resource for the CIO and the CISO on cyber security, looking beyond the technology horizon into leadership, management, culture, governance, resilience and the real dynamics of security transformation
Curated by JC Gaillard
Your new post is loading...
Your new post is loading...
Scooped by JC Gaillard
Scoop.it!

Ignoring Cybersecurity Is Intellectually Dishonest

Ignoring Cybersecurity Is Intellectually Dishonest | Cybersecurity Leadership | Scoop.it

Organizations are still inviting trouble by using legacy tactics and a multitude of legacy tools, coupled with insufficient planning of their cybersecurity programs.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Despite a Year of Warnings and Patching, Nearly 3 Out of 4 Organizations Still Vulnerable to Log4Shell

Despite a Year of Warnings and Patching, Nearly 3 Out of 4 Organizations Still Vulnerable to Log4Shell | Cybersecurity Leadership | Scoop.it

The battle against Log4Shell is proceeding very slowly due to a confluence of factors. It remains buried in a number of assets, particularly legacy systems that are tougher to address. But it also continues to affect organizations via new devices.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

How legacy tech impedes zero trust and what to do about it

How legacy tech impedes zero trust and what to do about it | Cybersecurity Leadership | Scoop.it
Old perimeter-based defenses can throw up roadblocks to implementing a zero-trust strategy, but a measured, phased approach will see you through.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Inertia is the enemy of cybersecurity

Inertia is the enemy of cybersecurity | Cybersecurity Leadership | Scoop.it

It’s not just individual behavioral inertia that makes it easy for bad actors. Organizational inertia is equally a problem, and it’s often the largest organizations that are most stuck in their ways.

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Cyber Security: "For every one new solution, remove two legacy solutions"

Cyber Security: "For every one new solution, remove two legacy solutions" | Cybersecurity Leadership | Scoop.it

Greg Day, Palo Alto Networks on the Changing Role of CISOs: "The path forward has to be to better automate the SOC to empower scale, but the challenge for many organizations is both having the time to shift processes and capabilities whilst still dealing with the current workload."

No comment yet.
Scooped by JC Gaillard
Scoop.it!

Securing the Internet of Old Things

Securing the Internet of Old Things | Cybersecurity Leadership | Scoop.it
The IoT is growing at an unprecedented rate and market forecasts are ambitious. While IHS has suggested that there will be 30.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

It's legacy banking systems that are the risk, not fintech

It's legacy banking systems that are the risk, not fintech | Cybersecurity Leadership | Scoop.it
Is Mark Carney wrong to say that fintech presents a big systematic risk to the banking system? Story by Mark Holmes.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

A CISO's Guide to Paying Down Software Supply Chain Security Debt

A CISO's Guide to Paying Down Software Supply Chain Security Debt | Cybersecurity Leadership | Scoop.it
When you just keep filing it away to handle "someday," security debt typically rears its head when you are most vulnerable and can least afford to pay it.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

The Cybersecurity Spiral Of Failure—And How Organizations Can Break Out Of It

The Cybersecurity Spiral Of Failure—And How Organizations Can Break Out Of It | Cybersecurity Leadership | Scoop.it
Successful transformation in the cybersecurity space takes time because of the need to effectively embed secure practices across the culture of the firm.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Today’s Enterprises Have A Complexity Problem: Their Profits, Productivity And Security Depend On Solving It

Today’s Enterprises Have A Complexity Problem: Their Profits, Productivity And Security Depend On Solving It | Cybersecurity Leadership | Scoop.it

Modern enterprises need to consider the consequences of increasing complexity as a result of maintaining so many layers of their tech stack. .

No comment yet.
Scooped by JC Gaillard
Scoop.it!

7 ways technical debt increases security risk

7 ways technical debt increases security risk | Cybersecurity Leadership | Scoop.it
Shoddily developed and deployed projects can leave your enterprise vulnerable to attacks. Here's how to stop technical debt from sending your organization to the cyber-poorhouse.
No comment yet.
Scooped by JC Gaillard
Scoop.it!

Complex IT systems a bane for cyber security and data privacy

Complex IT systems a bane for cyber security and data privacy | Cybersecurity Leadership | Scoop.it

Whenever a cyber attack occurs, the finger is usually pointed at a single compromised computer or a careless user unwittingly opening up his machine to hackers. Less is said of a big problem facing all organisations today – the complexity of IT systems. It is the underlying reason why hackers are let through and data is lost, sometimes without even the victims knowing

No comment yet.
Scooped by JC Gaillard
Scoop.it!

WannaCry Demonstrates Directors Need Better Understanding of Technical Debt

WannaCry Demonstrates Directors Need Better Understanding of Technical Debt | Cybersecurity Leadership | Scoop.it
Wayne Sadin, chief technology and chief operating officer of Affinitas Life, tells CIO Journal that cybersecurity vigilance by the board could have avoided or decreased the panic linked to the WannaCry ransomeware attack. “Boards shouldn’t micromanage, but they should understand why patching may not be happening,” he says.
No comment yet.