Multi-Site Mastery: Strategies for Effective Risk Assessments

Multi-Site Mastery: Strategies for Effective Risk Assessments

In this episode of The Security Podcasts we sit down with Mark Landry, National Accounts Director at AMAROK, to discuss navigating multi-site risk assessment effectively. “In order to approach your risk assessment, especially when you’ve got vast or disparate geographies – meaning you’ve got a location in Portland, Maine and location in Portland, Oregon – you have to be able to accurately convey the risk across both of those locations that have very different risk…

Read More

Proving physical security value across an organization

Proving physical security value across an organization

In this episode of The Security Podcasts we sit down with Thomasina Martin, a Key Account Manager specializing in Energy and Utilities at Genetec, Inc., to talk about proving the value of physical security across an organization. “One of the primary challenges I think a lot of us see, I think it’s universal in the security industry when trying to secure a budget, is that physical security often competes with other critical business units or…

Read More

Balancing Risk and Innovation – A CISO Perspective

Balancing Risk and Innovation – A CISO Perspective

In this episode of The Security Podcasts featuring Jill Knesek, CISO of Blackline, and former FBI Special Agent in the Cyber Crime Squad, we talk about balancing risk & innovation from a CISO’s perspective. “The message I like to give is we can be both innovative and secure.,” Knesek says. “They’re not mutually exclusive, and they shouldn’t be. By shifting left and embedding strong security practices and controls earlier into our development lifecycle, we can…

Read More

Navigating political polarization in the workplace

Navigating political polarization in the workplace

In this episode of The Security Podcasts featuring Scott McHugh, retired CSO at LyondellBasell Chemical Company and Faculty at Rice University, we discuss the challenges security leaders face when navigating political polarization in the workplace. “This is actually not a new phenomenon,” Scott McHugh says. “It really started in the late ’90s, in the Clinton administration, and it’s just been manifesting itself through the years ever since then. And it’s become much more of a…

Read More

3 ways to safeguard identity and insurance in the age of AI

3 ways to safeguard identity and insurance in the age of AI

Narratives are constantly emerging of how people and devices both in the digital and physical world are being manipulated by generative AI. This is a threat to the economy at-large, and it is becoming a larger problem that insurance companies cannot ignore. Insurance policies are essential shock absorbers in many industries and without them, many businesses will not be able to survive generative AI-induced crises.  Insurance companies cannot ignore this threat from generative AI. It’s…

Read More

90% of organizations experienced an identity incident this past year

90% of organizations experienced an identity incident this past year

A report by the Identity Defined Security Alliance (IDSA) examined the identity security systems within large organizations. The study revealed trends in common identity incident vectors and direct organizational influence. It also analyzed the impact of trends such as cyber insurance, artificial intelligence (AI) and the shifting regulatory landscape. Among the studied organizations, 90% claimed to experience an identity-related event in the last year. This percentage remains consistent with the percentage from 2023.  More key…

Read More

Security leaders are facing a new wave of identity risks

Security leaders are facing a new wave of identity risks

A study has found that increased technological and organizational complexity is contributing to new identity risks that security leaders must manage. The study, done by ConductorOne, surveyed more than 500 IT security leaders in the United States and found that increased complexity is driving new identity risks.  On the subject of technology complexity, the report found that hybrid IT environments are common. 76% of respondents reported that their company has a hybrid IT environment. 18%…

Read More

Navigating the identity security landscape

Navigating the identity security landscape

In this episode of The Security Podcasts featuring Jeff Reich, Executive Director of the Identity Defined Security Alliance, we discuss the challenges security professionals are facing in the evolving landscape of identity security threats. “Something we see often is when we were asking the question, ‘how long do account stay active or in your system after someone leaves your organization?’ And certainly there are a number of organizations that say within two days it’s been…

Read More

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

NIST Cybersecurity Framework: A Cheat Sheet for Professionals

The National Institute of Standards and Technology has updated its Cybersecurity Framework for 2024. Version 2.0 of the NIST CSF, the first major update since the framework was released a decade ago, was created with the goal of expanding the primary audience from critical infrastructure to all organizations. In general, the NIST CSF aims to standardize practices to ensure uniform protection of all U.S. cyber assets. TechRepublic’s cheat sheet about the NIST CSF is an…

Read More

Non-human identities: Secure them now, not later

Non-human identities: Secure them now, not later

Non-human identities: Secure them now, not later | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More
1 2 3 4