CSO's collection of videos on topics ranging from cryptocurrency to data breaches to security leadership, as well as IT security-related videos from some of Foundry's most popular virtual summits,
Cyberattacks continue to threaten healthcare systems around the world, putting patients at risk and further eroding trust in healthcare providers. Can anything be done to reduce the risk, or will going to the doctor or hospital be a roll of the dice when it comes to personal and private data, as well as health equipment? Keith chats with Wes Wright, the chief healthcare officer at Ordr.net, about the ongoing threat of ransomware for healthcare systems.
The high-profile hack of MGM Resorts International is shining a light on the latest tactics being used by organized hackers to exploit large companies. What lessons can consumers and other businesses learn from these attacks? Keith chats with Ben Smith, Field CTO of security firm NetWitness, about the fallout from these attacks and how companies can shore up their own security.
Training employees to spot phishing attempts and raise security awareness is a multi-billion-dollar business, but does it really work? Recent high-profile cyberattacks have shown that it is still relatively easy for attackers to get employees to provide access to computer systems and networks. Keith chats with Kelly Reeves, a cybersecurity expert and researcher, about how companies can improve their security awareness training.
With new technology and attack methods such as AI voice phishing being used by hackers, the old methods of passwords and authentication may soon be going away. On this episode, Keith chats with Julianna Lamb, CTO and co-founder of Stytch, about new authentication methods that can improve security for end users and companies to help protect account information.
Data is the enabling infrastructure for security AI. Three characteristics are deterministic of success: data framework structures; data management; and data curation. Every cybersecurity vendor is going to roll-out a generative AI interface for their tools, and they should. The ability of the tool to create outcomes in your environment however will be determined not by the power of generative AI but in the data and the predictive AI models behind the generative AI.
There are multiple metrics CISOs can use to improve the effectiveness of security efforts and demonstrate business value and ROI. However, to get true value from security performance metrics, it’s important that CISOs avoid drowning in metrics that lack meaning or context, focusing on those that show how security is enabling the organization.
This session explores the metrics of most value to CISOs and outline how they can use them to not only measure and improve the effectiveness of their security efforts, but also show valuable business alignment.
If you are hesitant to embrace AI tools because of cybersecurity concerns, don’t miss this illuminating presentation from Dennis Legori who will explain why the risk of not using AI is greater than the risk of using it. What guardrails should you have in place to ensure AI is used for good and not creating unnecessary risk? How should you be thinking about completing a privacy impact analysis and risk assessment as your use of AI tools evolves? How can security leaders add speed bumps and education to provide caution and risk mitigation as needed? Dennis will share his perspective around these and other important issues you need to consider as you widely adopt AI tools in your organization.
Beyond firewalls and perimeter security, a zero trust architecture allows security officials to better protect data and system access to both outsider and insider threats, adopting a mantra of "trust no one". We explain the concept in this video.
ChatGPT and other AI tools can create content that helps bad actors create better phishing emails or generate malware/ransomware code. But on the other side of the coin, the tools can better educate users about security threats, identify bugs and vulnerabilities on websites faster, and help researchers in their security efforts. We chat with Etay Maor, an adjunct professor at Boston College and industry cybersecurity expert, about these key issues.
Years of security solutions have not made the Internet more secure, as reports of new attacks and data breaches occurring regularly. The issue is a broken system based on an incorrect assumption of what security is. Keith talks with Wes Kussmaul, CTO of The Authenticity Alliance, about how authenticity and better identification management can solve many of today’s security problems.
To help raise awareness about the types of tools hackers are using to eavesdrop or break into different systems, we chat with Etay Maor, an adjunct professor of cybersecurity at Boston College and an industry-recognized cybersecurity researcher. Knowing some of these tricks can help consumers and other professionals better secure their homes and offices. Guest: Etay Maor, adjunct professor of cybersecurity at Boston College, and industry-recognized cybersecurity researcher.
Artificial intelligence and its effect on cybersecurity (both good and bad) was one of the hottest topics at the annual Black Hat security conference in Las Vegas. Keith chats with security writer and editor Joan Goodchild about the biggest trends from the show.
CISO Joanna Burkey shares how HP, Inc. leverages a balanced, zero trust model that leans on modern tools and practices and diverse talent.
With more than 3 million cybersecurity roles estimated to be unfilled across the globe, security leaders must evolve their hiring and team development strategies. Learn what a smarter approach to recruitment and retention will mean for organizations.
XDR is one of security's buzziest acronyms—and for good reason. XDR, which stands for eXtended Detection and Response, promises to provide more timely and accurate threat detection by gathering and processing data from an integrated set of security tools. But it's early days yet and the market is changing rapidly, with different vendors offering not only different approaches but different definitions of XDR.
As enterprises build up their mobile, edge and cloud deployments, they're being challenged to deliver a more efficient, scalable network-security architecture. Secure access service edge (SASE) is the convergence of security and networking in a cloud-delivered model. Learn what's driving demand for SASE, how SASE providers' capabilities differ, and the skills companies need to get started.
With more than 35,000 employees covering the insurance needs of more than 6 million members in Pennsylvania, Delaware, West Virginia and New York, Highmark Health is an independent licensee of the Blue Cross Blue Shield Association. CISO Omar Khawaja discusses Highmark's journey to trust-centric security and offers advice for taking this methodical approach for your organization.
Minneapolis-based Target Corporation serves guests at nearly 1,900 stores and at Target.com. Of all of the industries impacted severely by the pandemic, retail was one hit most drastically. Yet Target was one of those businesses that was able to transform swiftly in order to operate under these challenges. Rich Agostino, SVP and CISO, shares what he learned about security in that environment.
With 24,000 employees and customers in more than 100 countries, Rockwell Automation is a global leader in industrial automation and digital transformation. As industries rely more and more on operational technology (OT), they can be vulnerable if they don't consider critical security strategies. Learn more about the state of OT security from Rockwell VP and CISO Dawn Cappelli.