CYBER THIS WEEK – DECEMBER 4, 2022

Where Advanced Cyberttackers Are Heading Next: Disruptive Hits, New Tech

To harden their defenses against APT groups and advanced attacks, companies should regularly verify their cybersecurity hygiene, develop and deploy incident response strategies, and integrate actionable threat intelligence feeds into their processes

Where Advanced Cyberttackers Are Heading Next: Disruptive Hits, New Tech (darkreading.com)

Clearing the fog: Identifying blind spots in cybersecurity budgeting

Cybersecurity blind spots are minor concerns about which companies do not have complete visibility or the spots aren’t as visible. They are often ignored in the wake of focusing on potentially more significant cybersecurity concerns.

Clearing the fog: Identifying blind spots in cybersecurity budgeting | Security Magazine

CPMI and IOSCO report on financial market infrastructures’ cyber resilience and highlight concerns

The report, ‘Implementation monitoring of the PFMI: Level 3 assessment on Financial Market Infrastructures’ Cyber Resilience’, presents the results of an assessment of the state of cyber resilience at 37 FMIs from 29 jurisdictions. The report finds one ‘serious issue of concern’ and four ‘issues of concern’.

CPMI and IOSCO report on financial market infrastructures’ cyber resilience and highlight concerns (continuitycentral.com)

Implementation monitoring of the PFMI: Level 3 assessment on Financial Market Infrastructures’ Cyber Resilience (bis.org)

8 things to consider amid cybersecurity vendor layoffs

Cybersecurity vendor layoffs raise several issues for CISOs and customers, not the least of which are security- and risk-related factors. Here are 8 things to consider if your security vendor has announced significant staff cuts.

8 things to consider amid cybersecurity vendor layoffs | CSO Online

How Penetration Testing Showed Me what’s missing in Security

If your company is utilizing pentests, you need to make sure all employees see and understand the human vulnerabilities that comes from it afterwards. Everyone from the CEO to the receptionist should be aware of where your business is vulnerable so you can close the open doors.

How Penetration Testing Showed Me What’s Missing in Security – CPO Magazine

A Modern CISO’s Critical Roles & Responsibilities

To understand their risk and develop strategies against these attacks, C-suites and Boards of Directors are looking at CISOs (Chief Information Security Officers) to give them answers. Not only do these leaders expect CISOs to manage their company’s internal risk, but make sure that the right people and technologies are in place to support all kinds of cybersecurity initiatives.

A Modern CISO’s Critical Roles & Responsibilities (bitsight.com)

Prosper in the cyber economy

IBM Institute for Business Value (IBV) partnered with Oxford Economics to interview more than 2,300 business, operations, technology, cyber risk, and cybersecurity executives across 18 industries and 25 countries. This research presents one of the most comprehensive analyses to date of insights from leaders responsible for driving their organizations’ IT and information security (IS) agendas.

Cyber risk management is an often-overlooked way to improve operational efficiency and financial performance. But if an organization can quantify the financial impact of risks, it can gain efficiencies, mitigate consequences, and avoid the loss of revenue, significantly improving its bottom line.

Prosper in the cyber economy | IBM

Worms of Wisdom: How WannaCry Shapes Cybersecurity Today

WannaCry changed the course of cybersecurity by demonstrating the inherent vulnerability of interconnected systems. And while it highlighted the need for better communication and data sharing across industries and operations, its short-lived rampage left some companies overconfident about their ability to handle emerging threats.

Worms of Wisdom: How WannaCry Shapes Cybersecurity Today (securityintelligence.com)

The Importance of Protecting Collaboration Tools from Cyberattacks

It’s imperative that businesses clearly understand the potential vulnerabilities that these communication tools present as well as develop a strategy for keeping employees safe and protected at all times.

The Importance Of Protecting Collaboration Tools From Cyberattacks (forbes.com)

How Should We Gauge a Company’s Cyber Health?

Podcast : As an outside observer, how can you tell if a company is staying cyber healthy? While there is no financial statement equivalency to let you know the strength of a company’s security profile, there are signals that’ll give you a pretty good idea.

How Should We Gauge a Company’s Cyber Health? (cisoseries.com)

Share: