CYBER THIS WEEK – JULY 9, 2023

How CISOs can make themselves ready to serve on the board

CISOs interested in board positions must focus on acquiring the right skills that complement their cybersecurity knowledge. Some ways to do that include venturing into new industries or consultant roles as well as through training and certifications

How CISOs can make themselves ready to serve on the board | CSO Online

Overcoming the Challenges of Securing Unstructured Data

Properly managing unstructured data can be challenging, and failures to do so can lead to data breaches and compliance penalties. On the other hand, having a successful strategy for managing unstructured data security can help protect the organization’s productivity, legal and regulatory compliance, and brand reputation

Overcoming the Challenges of Securing Unstructured Data – CPO Magazine

7-hour recovery: How an American business beat ransomware

At the CyberRisk Leadership Exchange in Cincinnati on June 7, the chief security officer of an Ohio bottling company used his lunchtime keynote address to recount how his company’s eight-person IT team detected, remediated and recovered from a ransomware attack — within the space of seven hours, without losing any business and without paying a dime to the attackers.

How a midsize American business recovered from a ransomware attack in less than a day | SC Media (scmagazine.com)

Critical infrastructure attacks are ramping up

The ransomware attack on the Colonial Pipeline in May 2021 illuminated the vulnerability of critical infrastructure to potential threats. Since then, security leaders have seen myriad other high-profile critical infrastructure attacks, and expect more to come.

Critical infrastructure attacks are ramping up | Security Magazine

How risk managers can best protect supply chains from cyberattacks

Given the amount of damage these attacks can cause, it is vital that risk managers and their suppliers understand and address the primary attack vectors and implement effective mitigation strategies.

How risk managers can best protect supply chains from cyberattacks | Online only | Strategic Risk Europe (strategic-risk-europe.com)

Greatest cyber threats to aircraft come from the ground

The aviation industry has reaped the benefits of digitization over the past ten years, but this has also triggered new risks, including social and technical vulnerabilities that had never previously been addressed

Greatest cyber threats to aircraft come from the ground | CSO Online

Why Cyber Pros Are Nervous About Quantum Computing Q-Day

Quantum computing will usher in an entirely new era of cyber challenges. Today, while security pros combat phishing, ransomware, distributed denial-of-service and social engineering attacks, a more dangerous threat gathers steam. It would be prudent to start Q-Day readiness plans now.

Cyber Pros Already Feel Threatened by Quantum Computing Q-Day (securityintelligence.com)

Exposure Management Looks to Attack Paths, Identity to Better Measure Risk

Exposure management is a relatively young industry segment that has taken off, driven by predictions from analyst firms, such as Gartner, that companies will shift from vulnerability management, attack-surface management, and privileged-account management to the more holistic capability of managing their exposure to threats.

Exposure Management Looks to Attack Paths, Identity to Better Measure Risk (darkreading.com)

How CIOs select their inner circle ​​​​​​​

CIOs have a lot on their plates. Not only do they need to make sure an organization keeps functioning, but they also need to stay on top of what’s best next for an organization.

How CIOs select their inner circle ​​​​​​​ | CIO Dive

Five critical controls against an industrial cyber attack

Organisations that form part of our critical infrastructure have an obligation to provide a safe working environment and a duty of care to the communities they operate in by ensuring appropriate cybersecurity investment.

There are five critical controls for OT cybersecurity identified by the SANS Institute that provides a framework to defend against adversary activity directed against OT networks, be it intellectual property theft, ransomware, or targeted cyber-physical effects.

Five critical controls against an industrial cyber attack (itbrief.com.au)

Share: