Leon Ravenna, CISO of KAR Global, starts each day on the job with the expectation that this could be his last. That's how urgent cybersecurity has become, and it's in part why he's driven to dispatch the image of the CISO as the bureaucratic "Dr. No."
Ransomware and nation-state threats are daunting. But the threat that concerns Mustapha Kebbeh the most is supply chain risk. The Brinks CISO discusses how he has tackled this, as well as the challenges of tool complexity and peer collaboration.
Darrell Bateman, the CISO of City Bank Texas, explains why governance and compliance issues are critical for security leaders in the banking industry and how success can help cement a CISO's relations with the board of directors.
Accenture's new ransomware report reveals key challenges in executing an effective communications plan. Robert Boyce, managing director of global cyber response, discusses why existing recovery strategies aren't enough and offers practical steps for managing a ransomware response.
The 2022 ISACA State of Cybersecurity report reveals trends in the cybersecurity workforce and the threat landscape, including understaffing and retention. "The imbalance between supply and talent is unchanged," says Jon Brandt, director of professional practices and innovation at ISACA.
As enterprises continue to embrace alternate methods of payment structure, card-not-present, or CNP, fraud will develop into other types of fraud. What will these types be? Experts Dondi Black of TSYS Payment Solutions and Dave Excell of Featurespace - share their views.
For organizations with legacy systems, effective security and risk management remain essential as they transition to cloud or hybrid environments, says Davanathan "Devan" Naidoo, CIO of New Dimension Corp. He shares essential strategies and lessons learned.
Security leaders are leveraging blockchain's decentralized approach to establish user identity, as it is designed to ensure the correction of transaction through reliable sources that help to contain fraudulent transactions, says Edmund Situmorang, CTO at Prodigi, Sinar Mas Group.
Sunder Krishnan, chief risk officer at Reliance Nippon Life Insurance Co., a joint venture of Reliance Capital and Nippon Life, discusses risk management approaches; using PAM, data encryption and other processes to safeguard customer data; and investing in behavioral systems to secure data.
David Pollino, former CISO of PNC Bank, joins two editors at ISMG to discuss what organizations can do to harden their cybersecurity defenses, how we need to think about our adversaries differently in today's threat landscape and how the "Great Resignation" is affecting cybersecurity.
In the latest "Proof of Concept," Lisa Sotto, partner and chair of the global privacy and cybersecurity practice at Hunton Andrews Kurth LLP and David Pollino, former CISO at PNC Bank, join Information Security Media Group editors to discuss U.S. regulatory trends and supply chain risk management.
Financial institutions must be aware of artificial intelligence being used by criminals against them, says John Buzzard, lead analyst, fraud and security, Javelin Strategy & Research. He discusses the findings of Javelin's latest identity fraud report.
Kumar Ritesh, CEO and founder of Singapore-based cybersecurity firm Cyfirma, explores the threat landscape in 2022 and the new TTPs among cybercriminals. He offers his opinion about how and why the first offensive action in the next war will be a cyberattack.
In the latest weekly update, four editors at ISMG discuss important cybersecurity issues, including the lessons we can learn from Okta's breach fallout and subsequent response, how the first NFT rug pull of 2022 has amounted to over $1 million, and the much-anticipated return to in-person events.
Leonard Ong, senior director, regional information security officer, APAC at GE Healthcare, says the role of a chief information security officer has changed a lot over the last two decades. In this interview, he discusses how CISOs now need to work together on the front lines with the business.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.