How CISOs Can Make Cybersecurity a Long-Term Priority for Boards

Cybersecurity is far more than a check-the-box exercise. To create companywide buy-in, CISOs need to secure board support, up their communication game, and offer awareness-training programs to fight social engineering and help employees apply what they’ve learned.

How CISOs Can Make Cybersecurity a Long-Term Priority for Boards (darkreading.com)

Protecting ships from cyber terrorism

By prioritizing cybersecurity measures in the face of evolving threats, maritime organizations can fortify their resilience against cyberattacks, ensuring the safety and integrity of their operations and to the public at large.

Protecting ships from cyber terrorism | Security Magazine

Orchestrating cyber-informed engineering in the real world

A risk management methodology, Cyber-Informed Engineering (CIE) is an emerging method to integrate cybersecurity considerations into the conception, design, development, and operation of any physical system, energy or otherwise, to mitigate or even eliminate avenues for cyber-enabled attacks.

Orchestrating cyber-informed engineering in the real world – FutureIoT

Why the FCC’s cybersecurity labeling program benefits IoT systems

As we navigate this interconnected world, initiatives like these play a vital role in cultivating a security-first mindset, ensuring that our industry can safely and securely realize the benefits of IoT.

Why the FCC’s cybersecurity labeling program benefits IoT systems | SC Media (scmagazine.com)

Tabletop exercises explained: Definition, examples, and objectives

Less intense than a full-scale simulation, a tabletop exercise is an opportunity to see how your organization and staff will react under pressure.

Tabletop exercises explained: Definition, examples, and objectives | CSO Online

What’s missing for SMBs? A solid cybersecurity culture

Small businesses can be especially vulnerable to cyberattacks because of their limited resources, and few have employees on staff who truly understand the value of secure business operations

What’s missing for SMBs? A solid cybersecurity culture | Cybersecurity Dive

Operational Intelligence: A Crucial Link In Your Cybersecurity Posture

By bridging the gap between strategic and tactical intelligence, operational threat intelligence enables security teams to take proactive and informed actions against potential threats

Operational Intelligence: A Crucial Link In Your Cybersecurity Posture (forbes.com)

The XZ Backdoor: Everything You Need to Know

Details are starting to emerge about a stunning supply chain attack that sent the open source software community reeling.

The XZ Backdoor: Everything You Need to Know | WIRED

CISA Announces Proposed Cyber Incident Reporting Rule

CISA’s proposed cyber incident reporting rule would be a substantial shift in the cyber regulatory landscape. The Proposed Rule significantly expands the scope of cyber incident reporting requirements under federal law without harmonizing with other, existing federal reporting obligations.

2024-06526.pdf (federalregister.gov)

Client Alert: CISA Announces Proposed Cyber Incident Reporting Rule | Jenner & Block LLP | Law Firm

Zero-Trust Architecture: What You Need to Know

If your organization hasn’t yet adopted a zero-trust architecture, it’s sitting on a cybersecurity time bomb. Now is the time to defuse the threat.

Zero-Trust Architecture: What You Need to Know (informationweek.com)

Share: