CYBER THIS WEEK – APR 07, 2024
How CISOs Can Make Cybersecurity a Long-Term Priority for Boards
Cybersecurity is far more than a check-the-box exercise. To create companywide buy-in, CISOs need to secure board support, up their communication game, and offer awareness-training programs to fight social engineering and help employees apply what they’ve learned.
How CISOs Can Make Cybersecurity a Long-Term Priority for Boards (darkreading.com)
Protecting ships from cyber terrorism
By prioritizing cybersecurity measures in the face of evolving threats, maritime organizations can fortify their resilience against cyberattacks, ensuring the safety and integrity of their operations and to the public at large.
Protecting ships from cyber terrorism | Security Magazine
Orchestrating cyber-informed engineering in the real world
A risk management methodology, Cyber-Informed Engineering (CIE) is an emerging method to integrate cybersecurity considerations into the conception, design, development, and operation of any physical system, energy or otherwise, to mitigate or even eliminate avenues for cyber-enabled attacks.
Orchestrating cyber-informed engineering in the real world – FutureIoT
Why the FCC’s cybersecurity labeling program benefits IoT systems
As we navigate this interconnected world, initiatives like these play a vital role in cultivating a security-first mindset, ensuring that our industry can safely and securely realize the benefits of IoT.
Why the FCC’s cybersecurity labeling program benefits IoT systems | SC Media (scmagazine.com)
Tabletop exercises explained: Definition, examples, and objectives
Less intense than a full-scale simulation, a tabletop exercise is an opportunity to see how your organization and staff will react under pressure.
Tabletop exercises explained: Definition, examples, and objectives | CSO Online
What’s missing for SMBs? A solid cybersecurity culture
Small businesses can be especially vulnerable to cyberattacks because of their limited resources, and few have employees on staff who truly understand the value of secure business operations
What’s missing for SMBs? A solid cybersecurity culture | Cybersecurity Dive
Operational Intelligence: A Crucial Link In Your Cybersecurity Posture
By bridging the gap between strategic and tactical intelligence, operational threat intelligence enables security teams to take proactive and informed actions against potential threats
Operational Intelligence: A Crucial Link In Your Cybersecurity Posture (forbes.com)
The XZ Backdoor: Everything You Need to Know
Details are starting to emerge about a stunning supply chain attack that sent the open source software community reeling.
The XZ Backdoor: Everything You Need to Know | WIRED
CISA Announces Proposed Cyber Incident Reporting Rule
CISA’s proposed cyber incident reporting rule would be a substantial shift in the cyber regulatory landscape. The Proposed Rule significantly expands the scope of cyber incident reporting requirements under federal law without harmonizing with other, existing federal reporting obligations.
2024-06526.pdf (federalregister.gov)
Client Alert: CISA Announces Proposed Cyber Incident Reporting Rule | Jenner & Block LLP | Law Firm
Zero-Trust Architecture: What You Need to Know
If your organization hasn’t yet adopted a zero-trust architecture, it’s sitting on a cybersecurity time bomb. Now is the time to defuse the threat.
Zero-Trust Architecture: What You Need to Know (informationweek.com)