article thumbnail

Thinking Forward: IT Governance & Cybersecurity for 2024 & Beyond

LogisManager

Thinking Forward: IT Governance & Cybersecurity for 2024 & Beyond Last Updated: January 22, 2024 As we step into 2024, practitioners and managers of IT Governance & Cybersecurity programs are under more pressure than ever. Doing so allows you to proactively manage risk and stay nimble in the face of changes ahead.

article thumbnail

Five Cybersecurity Sessions to Attend at ISC East

Security Industry Association

Among the robust lineup of conference sessions are several dynamic presentations on critical cybersecurity topics. At ISC East, you’ll discover expert insights on cloud security and data breaches, ensuring cybersecurity of physical security installations, key government cyber defense initiatives and more. 15, 10:30-11:15 a.m.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Microsoft misfire: what can be learnt from the tech giant’s cybersecurity failings

SRM

Earlier this month, a federal cybersecurity watchdog group reported that Microsoft’s cloud cybersecurity has colossal and far-spanning shortcomings, including failed technology and an “inadequate” security culture that “requires an overhaul.” The first is that an effective cybersecurity culture is essential for modern business success.

article thumbnail

How can AI improve your business’s cybersecurity posture?

Online Computers

AI is transforming the cybersecurity field, bringing a multitude of benefits to help businesses improve their overall security posture. You can utilize AI to automate these tasks and free up your IT experts to focus on more strategic projects and complex problem-solving.

article thumbnail

Ann Barron-DiCamillo: AI in Cybersecurity - Balancing Speed and Control

FS-ISAC

Episode Notes Generative AI (GenAI) is changing the cybersecurity landscape at a phenomenal pace, creating both new challenges and opportunities. Ann, also the current Chair of FS-ISAC's Board, discusses supply chain risks, the importance of information sharing and nurturing the cybersecurity talent pool.

article thumbnail

The Difference Between Strategic and Operational Risk

Reciprocity

New technologies, increasing digitization, and evolving customer demands create risks that can disrupt operations, weaken cybersecurity, and harm the organization’s reputation or financial position – and above all, leave the organization unable to achieve its business objectives. Strategic and Operational Risk: A Brief Intro.

article thumbnail

3 Ways to cybersecurity incident preparedness

Online Computers

While a major part of cybersecurity involves protecting your business from threats, you should also be prepared for what to do should you fall victim to cybercrime. This blog explores three ways you can better prepare for a cybersecurity incident. Your company’s risk tolerance – In cybersecurity, achieving zero risk is impossible.