Reporting Healthcare Cyber Incidents Under New CIRCIA Rules

Numerous high-profile cybersecurity events in recent years, such as the Colonial Pipeline and SolarWinds attacks, spurred the US government to implement new legislation. In response to the growing threat, President Biden signed the Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) in March 2022. While the law has passed, many healthcare organizations remain […]

The post Reporting Healthcare Cyber Incidents Under New CIRCIA Rules appeared first on Security Intelligence.

Continue reading Reporting Healthcare Cyber Incidents Under New CIRCIA Rules

What Your Team Can Learn From the DHS Cybersecurity Hiring Program

Employees looking for cybersecurity jobs with the federal government can now use a new system and process. The Department of Homeland Security (DHS) recently launched its Cybersecurity Talent Management System (CTMS), which is more than a new system or website. The CTMS represents a new approach to hiring in the industry. Cyberattacks are on the […]

The post What Your Team Can Learn From the DHS Cybersecurity Hiring Program appeared first on Security Intelligence.

Continue reading What Your Team Can Learn From the DHS Cybersecurity Hiring Program

Changing the Conversation with Risk Quantification

“Quantitative risk analysis is the single most effective way to align security with business priorities and establish credibility with teams.” — U.S.-based CISO As organizations continue to leverage the latest technologies and move toward even greater interconnectivity in the pursuit of growth, business strategy and cybersecurity continue to converge. Cybersecurity concerns now extend beyond the […]

The post Changing the Conversation with Risk Quantification appeared first on Security Intelligence.

Continue reading Changing the Conversation with Risk Quantification

Why CISOs Shouldn’t Report to CIOs in the C-Suite

Cybersecurity plays a critical role in enterprises today. It has evolved from playing a fringe role to one that impacts every person in every business developed over the past 15 years. This shift will continue as we see not only more frequent attacks but also more devastating effects from cyber breaches. A critical change in […]

The post Why CISOs Shouldn’t Report to CIOs in the C-Suite appeared first on Security Intelligence.

Continue reading Why CISOs Shouldn’t Report to CIOs in the C-Suite

The Future of Cybersecurity: What Will it Look Like in 2031?

Ever wonder what the state of cybersecurity in 2031 will look like? While 10 years may seem a long way into the future, the speed at which the industry is evolving is sure to make the next decade fly by. Predicting the future of cybersecurity isn’t about looking into the crystal ball merely for fun. […]

The post The Future of Cybersecurity: What Will it Look Like in 2031? appeared first on Security Intelligence.

Continue reading The Future of Cybersecurity: What Will it Look Like in 2031?

The CISO and the C-Suite: How to Achieve Better Working Relations

As the workforce moved from the cubicle desk to the dining room table in 2020, cybersecurity suddenly became everyone’s concern. Focus turned to the chief information security officer (CISO). It’s their job to keep businesses running and secure. In many companies, that also meant juggling a move to a full digital transformation with effective remote […]

The post The CISO and the C-Suite: How to Achieve Better Working Relations appeared first on Security Intelligence.

Continue reading The CISO and the C-Suite: How to Achieve Better Working Relations

How AI Prevents Fatigue After Data Breaches

I have data breach fatigue. Every day, my inbox is flooded with dozens of emails about the newest data breaches and what causes them. Five years ago, I took note of every company listed and the mistakes made that led to the breach. Today, I barely skim them. How many times can I read that a […]

The post How AI Prevents Fatigue After Data Breaches appeared first on Security Intelligence.

Continue reading How AI Prevents Fatigue After Data Breaches

Driving the Desire for FAIR: What Is Your ‘Why’ for Security Risk Quantification?

One of the first questions I ask when working with an organization is “Why are you interested in making FAIR (Factor Analysis of Information Risk) a part of your standard risk management practice?” The answer is different for every client, and that truly highlights the value of risk quantification. We can apply risk quantification to […]

The post Driving the Desire for FAIR: What Is Your ‘Why’ for Security Risk Quantification? appeared first on Security Intelligence.

Continue reading Driving the Desire for FAIR: What Is Your ‘Why’ for Security Risk Quantification?

How to Get on the CISO Certification Path

Cybersecurity workers are very proud of their certifications. Just check their email signatures for the alphabet of them: CISSP (certified information systems security professional), CISM (certified information security manager) and CCISO (certified chief information security officer) to name a few. But does every CISO need a CISO certification? And if you want to be a CISO, […]

The post How to Get on the CISO Certification Path appeared first on Security Intelligence.

Continue reading How to Get on the CISO Certification Path

Zero Trust: Confidently Secure Your Business to Grow Fearlessly

What would your business be able to do if security risks were no longer a concern?  What sort of products would you build for your customers? What types of experiences could you enable for your employees to be more effective? What would you change to power your business forward? As the general manager for IBM […]

The post Zero Trust: Confidently Secure Your Business to Grow Fearlessly appeared first on Security Intelligence.

Continue reading Zero Trust: Confidently Secure Your Business to Grow Fearlessly