CISO Suite

CISO Suite

2018-02-17_ITTGroup

Weekly Cyber Risk Roundup: Olympic Malware and Russian Cybercrime

/
More information was revealed this week about the Olympic Destroyer malware and how it was used to disrupt the availability of the Pyeonchang Olympic’s official website for a 12-hour period earlier this ...
vsRisk Demonstration

Understanding our risk assessment software

/
Our sales and support executive Gary Baxter, has produced an extended demonstration video for our risk assessment software vsRisk 3.0. The aim of the video is to walk you through the software ...

The number of organizations unprepared for cyber-attacks rose year over year

/
To anyone who has been paying attention, this isn’t as much of a surprise, as it is a confirmation of the ongoing tenuous condition of enterprise cybersecurity but a just-released survey from ...

CISOs should report directly to the CEO, study shows

/
Keeping senior leadership abreast of security strengths and vulnerabilities has become a top priority, according to financial sector Chief Information Security Officers (CISOs). And direct communication with the CEO has become imperative, ...
HHS Deputy CIO Amélie Koran on Security's Challenges, Part 1

HHS Deputy CIO Amélie Koran on Security’s Challenges, Part 1

/
Meet Amélie Koran, deputy CIO for the U.S. Department of Health and Human Services, Office of the Inspector General, and one of the keynote speakers at the upcoming InfoSec World 2018 March 19-21 ...
2018-02-10_ITT.png

Weekly Cyber Risk Roundup: Cryptocurrency Attacks and a Major Cybercriminal Indictment

/
Cryptocurrency continued to make headlines this past week for a variety of cybercrime-related activities. For starters, researchers discovered a new cryptocurrency miner, dubbed ADB.Miner, that infected nearly 7,000 Android devices such as ...
5 Steps to Conducting an Enterprise Security Risk Analysis

5 Steps to Conducting an Enterprise Security Risk Analysis

In the world of cybersecurity, identifying risks and how they will impact the organization is of paramount importance. In general terms, risk is comprised of two specific components: The statistical... Go on ...
How to Break Into the Field of Security Risk Management

How to Break Into the Field of Security Risk Management

/
A career in risk management takes place along the front lines of the ongoing cyber war. You must be logical, analytical and level-headed in order to lead the way and keep your ...

Why CISOs should understand the threat landscape to bolster security in 2018

/
Doctors can’t prescribe proper treatment for patients without identifying and analyzing symptoms to make a clinical diagnosis. It’s the same for CISOs, who are responsible for their organization’s digital health ...
Loading...