The 3 C's of a successful security investigation

The 3 C's of a successful security investigation

Security professionals conducting internal investigations are faced with the challenge of gathering credible evidence to determine if, when, where, why and how an incident occurred. Cynthia Merchant, Associate Director, Global Security at pharmaceutical company Novartis, has worked in and built security functions for more than a decade, having held senior investigative roles at Phillip Morris International and Eli Lilly prior to her current position. “I see the security function as the hub of a bicycle…

Read More

The most used password in 2022 was ‘password’

The most used password in 2022 was ‘password’

The most used password in 2022 was ‘password’ | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Top security conferences of 2023

Top security conferences of 2023

Top security conferences of 2023 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

David Young talks the modern CSO role at the SECURITY 500 Conference

David Young talks the modern CSO role at the SECURITY 500 Conference

David Young talks the modern CSO role at the SECURITY 500 Conference | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Lucas Moody named SVP and CISO at Alteryx

Lucas Moody named SVP and CISO at Alteryx

Lucas Moody named SVP and CISO at Alteryx | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Josh Walker named VP of Security at Bridgestone Americas

Josh Walker named VP of Security at Bridgestone Americas

Josh Walker named VP of Security at Bridgestone Americas | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Terry Phillips appointed Chief Security Officer at Leidos

Terry Phillips appointed Chief Security Officer at Leidos

Terry Phillips appointed Chief Security Officer at Leidos | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website…

Read More

Enterprise security’s evolution in Asia: Building business continuity and resilience

Enterprise security’s evolution in Asia: Building business continuity and resilience

Enterprise security’s evolution in Asia: Building business continuity and resilience | 2021-04-30 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn…

Read More

Putting the global in GSOCs: How to build a comprehensive digital risk protection approach

Putting the global in GSOCs: How to build a comprehensive digital risk protection approach

Putting the “global” in GSOCs: How to build a comprehensive digital risk protection approach | 2021-02-17 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and…

Read More