CYBER THIS WEEK – MAY 26,2024
One CISO Can’t Fill Your Board’s Cybersecurity Gaps
Adding a chief information security officer to a board is a popular move, but it’s not enough to improve cyber resilience. Learn how to raise an entire board’s security acumen.
One CISO Can’t Fill Your Board’s Cybersecurity Gaps (mit.edu)
Navigating Risk Management in the Age of AI
Safeguarding against AI risk amidst rising innovation and a shifting global regulatory landscape.
HITRUST: the Path to Cyber Resilience
Risk management is crucial to achieving cyber resilience and must be addressed. But how can you walk the line between over-optimism and over-precaution? By using a solid assurance framework. HITRUST offers one such framework.
HITRUST: the Path to Cyber Resilience | Tripwire
Can Cybersecurity Be a Unifying Factor in Digital Trade Negotiations?
As policymakers continue to take a more active role in domestic cybersecurity policymaking, governments must also ensure that regulations are interoperable with those of their counterparts in order to avoid unnecessary non-tariff barriers to trade.
Can Cybersecurity Be a Unifying Factor in Digital Trade Negotiations? (darkreading.com)
Cyber-insurance planning for businesses
As the typical cost of a data breach now stands at more than £3 million, cyber-insurance coverage has become more important in helping companies pay for damages, repairs, and other associated expenses.
Leveraging identity: The first line of cyber defense strategy
By prioritizing identity as the first line of defense, businesses can establish a strong cybersecurity foundation, enabling them to respond to threats proactively and mitigate the impact of cyberattacks effectively.
Leveraging identity: The first line of cyber defense strategy | Biometric Update
Hijack of monitoring devices highlights cyber threat to solar power infrastructure.
An attack on remote monitoring devices in Japan underscores an emerging cybersecurity threat to the rapidly growing solar component of the power grid.
Hijack of monitoring devices highlights cyber threat to solar power infrastructure | CSO Online
Four Cybersecurity Moves Every Manufacturer Can Make
Increased operational technology and internet of things device adoption have significantly expanded the manufacturing industry’s attack surface. Each entry point is an opportunity for cybercriminals to disrupt production and compromise critical systems.
Four Cybersecurity Moves Every Manufacturer Can Make | SupplyChainBrain
Planning A Merger Or Acquisition? Ask These Five Cyber Questions First
The fast-paced amalgamation of two entities magnifies the attack surface, merges diverse IT infrastructures and often uncovers discrepancies in security protocols—each a potential opening for cyber threats.
Planning A Merger Or Acquisition? Ask These Five Cyber Questions First (forbes.com)
How to Reduce Data Leakage Risks of ChatGPT and Copilot AI
CISOs are acutely aware of the delicate balance between leveraging AI for its immense benefits and safeguarding their organization against the potential damages that could arise from compromised data security.
How to Reduce Data Leakage Risks of ChatGPT and Copilot AI – CPO Magazine