article thumbnail

Insights on Mitigating Ransomware Risks

Data Breach Today

Janine Darling, the founder and CEO of STASH Global, discusses the pervasive and persistent problem of ransomware and how to mitigate the risks

Risk 234
article thumbnail

Taking a Risk-Based Approach to Cybersecurity

Data Breach Today

Many experts advise organizations to pivot from a maturity-based approach to a risk-based approach to cybersecurity. Tia Hopkins, field CTO and chief cyber risk strategist at eSentire, discusses where the maturity-based approach falls short and how a risk-based approach can help organization

Risk 206
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Russia-Ukraine War: Cyberattack Escalation Risk Continues

Data Breach Today

Memo to CISOs: Risk of Attack Spillover - If Not Direct Attacks - Remains Notable As the Russia-Ukraine war continues, cybersecurity officials say the risk of attack spillover - and perhaps the direct targeting of critical infrastructure sectors outside Ukraine - remains high.

Risk 217
article thumbnail

Why Healthcare Orgs Must Prioritize 3rd-Party Risk Management

Data Breach Today

Venminder CEO James Hyde on Reducing Risk Exposure From Vendor Relationships With breaches on the rise and the average cost of a healthcare breach reaching a staggering $10.1 million in 2022, third-party risk management is a growing concern in the healthcare industry.

Risk 130
article thumbnail

The Unexpected Cost of Data Copies

This paper will discuss why organizations frequently end up with multiple data copies and how a secure "no-copy" data strategy enabled by the Dremio data lake service can help reduce complexity, boost efficiency, and dramatically reduce costs.

article thumbnail

The Fifth Option in Risk Treatment

Data Breach Today

Book Excerpt: Peter Gregory on Ignoring the Risk In an excerpt from his book "CRISC Certified in Risk and Information Systems Control All-In-One Exam Guide," Peter Gregory discusses choosing the fifth option in risk management, which is ignoring the risk.

Risk 197
article thumbnail

Quantum Computing: Assessing the Risks

Data Breach Today

William Dixon of World Economic Forum on Improving Infrastructure To unlock the value of quantum computing, two systemic risks - tech governance and cybersecurity - need to be overcome, says William Dixon of the World Economic Forum

Risk 217
article thumbnail

BitSight CEO on Going From Security Ratings to Managing Risk

Data Breach Today

Steve Harvey on Why Boards Want to Understand the Risk Factors, Not Just the Rating Security ratings provide a strong indication of potential risk, but boards increasingly want to drill into the underlying risk factors, says CEO Steve Harvey.

Risk 130
article thumbnail

Cybersecurity Leadership: Risk Exposure Awareness

Data Breach Today

CEOs and CISOs on Assessing and Mitigating the New Risk Landscape It might be new, but are we ready to call this "normal?"

Risk 236
article thumbnail

Uniform Infrastructure Raises Risk for Industrial Attacks

Data Breach Today

Dragos CEO: Unpatched Vulnerabilities Less of a Problem in OT Than Outsiders Think The increased physical connectivity of digital assets has expanded the attack surface and added complexity for engineers in industrial environments, says Dragos CEO Robert Lee.

Risk 130
article thumbnail

Successful Change Management with Enterprise Risk Management

Speaker: William Hord, Vice President of ERM Services

Join us as we discuss the various tangents of data and the change management process that will help you make better risk-based business decisions to save time and money for your organization.

article thumbnail

RSA Spins Off Fraud and Risk Business

Data Breach Today

New Stand-Alone Firm Is Tasked With Combatting Digital Commerce Fraud RSA Security LLC has spun off its fraud and risk intelligence business into a stand-alone company named Outseer.

Risk 279
article thumbnail

Critical Steps for Enhancing 3rd-Party Risk Management

Data Breach Today

Recent security incidents involving third-party software, including Okta and Log4j, underscore the importance of healthcare entities taking steps to enhance their vendor risk management programs, says Chris Frenz, assistant vice president of IT security at Mount Sinai South Nassau

Risk 203
article thumbnail

Reducing Risk by Breaking Down Supply Chain Siloes

Data Breach Today

Supply chain risk must be part of an enterprisewide risk management program framework, says information security manager Matt Marciniak of financial service firm Quantile. Reducing risk requires an agile approach to supplier management, he says

Risk 193
article thumbnail

Threat Watch: Russia-Ukraine War Remains Top CISO Risk

Data Breach Today

DXC Technology's Michael Baker on Top Threats, Recruitment Tips, Career Advice Threat watch: The ongoing Russia-Ukraine war continues to pose both direct and indirect risks to enterprise networks, says Michael Baker, vice president and IT CISO of IT services and consulting firm DXC Technology.

Risk 270
article thumbnail

Are You Ready For Predictive Analytics?

Speaker: Anita Lauper Wood, Product Strategist

Successful implementation of predictive analytics can feel unpredictable. There are risks that need to be consciously addressed, and successful implementation requires the right strategy. Join Anita Lauper Wood, Product Strategist, for a valuable session for product and technology leaders.

article thumbnail

On Risk-Based Authentication

Schneier on Security

A Study on Usability and Security Perceptions of Risk-based Authentication “: Abstract : Risk-based Authentication (RBA) is an adaptive security measure to strengthen password-based authentication. I’ve blogged about risk-based authentication before.

article thumbnail

How to Predict New Account Risk

Data Breach Today

Robin Love of Early Warning on How to Look at Fraud Risk Holistically Application fraud has spiked - particularly bogus new accounts - and organizations are scrambling to improve fraud detection mechanisms without negatively affecting the legitimate customer's experience.

Risk 130
article thumbnail

Quantify Risk, Calculate ROI

Dark Reading

SecurityScorecard's ROI Calculator helps organizations quantify cyber-risk to understand the financial impact of a cyberattack

Risk 82
article thumbnail

Medical Devices: Tackling 3rd-Party Component, Software Risk

Data Breach Today

The integration of third-party components and software is an increasingly critical area of security risk that needs more attention from medical device manufacturers, says Anura Fernando, global head of medical device security at safety certification and consulting firm UL

Risk 194
article thumbnail

Cover Your SaaS: How to Overcome Security Challenges and Risks For Your Organization

Speaker: Ronald Eddings, Cybersecurity Expert and Podcaster

In this webinar, Ronald Eddings, Cybersecurity Expert, will outline the relationship between SaaS apps and IT & security teams, along with several actionable solutions to overcome the new difficulties facing your organization.

article thumbnail

Health Entities Should Vet Risks of ChatGPT Use

Data Breach Today

AI Tools are Tempting Productivity Aides for Clinicians, But What Are the Patient Data Risks? What are the risks

Insurance 130
article thumbnail

Assessing Cyber Risk, Maturity in Healthcare M&As

Data Breach Today

When healthcare organizations come together through mergers or acquisitions, it is critical for the entities to carefully assess the cyber risk each poses, as well as its level of cyber maturity, says Jigar Kadakia, CISO and chief privacy officer at Boston-based Mass General Brigham

Risk 130
article thumbnail

Managing Asset Risks During Healthcare M&As

Security Affairs

How healthcare delivery organizations (HDOs) can manage the IT asset risks during a healthcare M&A process. And with new assets come new risks. An M&A should be a time for organizational improvement, not increased cyber security risks.

Risk 66
article thumbnail

The Persisting Risks Posed by Legacy Medical Devices

Data Breach Today

Legislation requiring vendors to design cybersecurity into their medical devices is a great first step to help healthcare entities, but organizations will still face major risks involving legacy medical gear for many years to come, says Daniel dos Santos, research leader at security firm Forescout

Risk 130
article thumbnail

Shift Left Security? Development Does Not Want to Own It.

Speaker: Shlomo Bielak, CTO, Benchmark Corp

Shifting security left to the earliest part of development is currently in the spotlight in the developer world. What teams are now discovering is, this approach results in misdirected ownership for developers and a frustrated security team. In the current climate, we cannot afford to let security implementations falter. It's time to manage your team's energies to maximize DevOps efficiency, all the while maintaining top security standards. Join Shlomo Bielak, and learn how to keep your DevSecOps team focused and connected without creating silos.

article thumbnail

Reducing Risks by Optimizing Your Cybersecurity Workflow

Data Breach Today

CISOs have enough tools to identify security weaknesses, says Yoran Sirkis, but they need a way to make the information those tools gather more accessible and to streamline the remediation process. The CEO of Seemplicity discusses how its platform can help security leaders manage remediations

Risk 202
article thumbnail

3 Cyber Risks in the Era of Musk and Twitter

Data Breach Today

CISO Marco Túlio Moraes on Cybersecurity and the Rise of the Stakeholder Theory Since Elon Musk became Twitter's CEO, cyber risks have affected the social media company in technological, financial, regulatory and reputational ways.

Risk 130
article thumbnail

Cybersecurity Should Focus on Managing Risk

Dark Reading

Instead, focus on finding and minimizing the greatest risks Preventing all data breaches is an unrealistic goal.

article thumbnail

Existential Risk and the Fermi Paradox

Schneier on Security

The risks we face today are existential in a way they never have been before. Uncategorized complexity risks security analysisWe know that complexity is the worst enemy of security, because it makes attack easier and defense harder.

Risk 85
article thumbnail

How to Solve 4 Common Challenges of Legacy Information Management

Speaker: Chris McLaughlin, Chief Marketing Officer and Chief Product Officer, Nuxeo

After 20 years of Enterprise Content Management (ECM), businesses still face many of the same challenges with finding and managing information. Join Chris McLaughlin, CMO and CPO of Nuxeo, as he examines four common business challenges that these legacy ECM systems pose and how they can be addressed with a more modern approach.

article thumbnail

Assessing the Security Risks of Emerging Tech in Healthcare

Data Breach Today

Federal Authorities Urge Healthcare Sector Entities to Take Caution A host of emerging technologies - including artificial intelligence, 5G cellular, quantum computing, nanomedicine and smart hospitals - offer the potential to revolutionize healthcare, but organizations must carefully evaluate the security risks, federal authorities warn.

article thumbnail

Why Third Parties Are an Organization's Biggest Risk Point

Data Breach Today

The Risk — And the Threat — Is Real Hackers are exploiting third-party remote access. If you’re not taking third-party risk seriously, it’s just a matter of time until your company is the next headline

Risk 207
article thumbnail

How Ransomware Has Changed the Nature of Risk

Data Breach Today

Kelly White of RiskRecon on Assessing Suppliers' Cyber Hygiene Ransomware has changed the risk landscape for suppliers and is forcing companies to reconsider their risk relationships, says Kelly White, co-founder and CEO of RiskRecon.

Risk 205
article thumbnail

Biometric Technology: Assessing the Risks

Data Breach Today

The growing use of biometric technology is raising concerns about privacy as well as identity theft and fraud, says attorney Paul Hales, who reviews recent legal and legislative developments

Risk 249
article thumbnail

Cyber Risk Quantification: The Quest for Transparency

Data Breach Today

BitSight's Stephen Boyer Says Regulations Are Driving Better Board-Level Awareness How can companies make their cybersecurity posture more transparent to stakeholders? That's a question being asked by both boards of directors and potential investors, says Stephen Boyer, founder and CTO of BitSight.

Risk 207
article thumbnail

The Complexity of Managing Medical Device Security Risk

Data Breach Today

The extremely diverse architectures and systems within the tens of thousands of very specialized types of medical devices used in clinical settings adds to the complexity healthcare organizations and manufacturers face in managing cybersecurity risk for these products, says Phil Englert of H-ISAC

Risk 206
article thumbnail

IoT Supply Chains: Where Risks Abound

Data Breach Today

ENISA Releases Guidance on Reducing IoT Supply Chain Risk IoT devices are like sausages: They're full of components of varying quality, and it's invariably disturbing to think about their origins.

IoT 230
article thumbnail

Regulators Warn Banks of Digital Asset Risks

Data Breach Today

Digital Assets Likely 'Inconsistent With Safe and Sound Banking Requirements' U.S.

Risk 130
article thumbnail

Healthcare CISO Group Focuses on Third-Party Risk Challenges

Data Breach Today

healthcare sector organizations better tackle some of the top challenges involving vendor risk management, a coalition of CISOs has launched the Health3PT Council. To help U.S.

Risk 130