News

Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk
The PrOTect OT Cybersecurity Podcast

Kayne McGladrey: The CISO’s Role Is To Advise on Business Risk

In this episode, Aaron and Kayne McGladrey discuss: - Strategic alignment of cybersecurity with business risk - Navigating the changing landscape of cybersecurity - Empowering CISOs in the evolving landscape of cybersecurity - The challenges and opportunities of generative AI
VCHH11 – [LIVE] The Scary Truth About Data Privacy – State of Security: Expert Insights on Cybersecurity Operations and the Business of Cyber
Virtual CISO Happy Hour

VCHH11 – [LIVE] The Scary Truth About Data Privacy – State of Security: Expert Insights on Cybersecurity Operations and the Business of Cyber

The conversation focuses on privacy and how to protect personal and corporate data. The speakers discuss core principles for safeguarding customer and employee data, including data minimization, secure coding practices, and continuous testing of controls. They emphasize the importance of communication with the board and legal teams, as well as the need for data retention and disposition schedules. The conversation also covers privacy training for software developers and IT professionals, as well as contractual obligations for vendors regarding data privacy. The speakers highlight the need for a national privacy standard in the US. The conversation covers various aspects of privacy, including data deletion and obfuscation, mobile device management and privacy, the effectiveness of privacy controls, future trends in privacy, and the importance of policies and training.
The Cyber Security Recruiter talks to Kayne McGladrey, field CISO at Hyperproof
The Cyber Security Recruiter

The Cyber Security Recruiter talks to Kayne McGladrey, field CISO at Hyperproof

Here is Kayne's Linkedin URL: https://www.linkedin.com/in/kaynemcgladrey/And the book he mentioned: Alaine de Botton The Pleasures and Sorrows of Work https:...
IEEE Transmitter

Quantum AI

Getting AI Right: 3 Challenges for the Future
IEEE Transmitter

Getting AI Right: 3 Challenges for the Future

When ChatGPT burst onto the scene in late 2022, it didn't just showcase the leaps AI had made; it painted a future filled with possibilities, shaping how AI is full of promise, but potential risks abound.
Impact of Technology 2024
IEEE Transmitter

Impact of Technology 2024

The speed of technology advancement and adoption has never been faster. We surveyed global technology leaders and asked our Impact Creators for their insights on what to expect.
ISC2

Bridging the Gap: Communicating Cyber Risks as Business Imperatives

As CISOs make plans to secure operating budgets for the new financial year, they face the age-old challenge of convincing stakeholders, who often see cybersecurity and privacy as a cost center, to invest in this area. It's time to change the narrative. Discover how to drive more productive conversations about cybersecurity as a strategic growth enabler. Take home actionable ideas for proactively managing controls and risks, increasing efficiency and reducing costs.
PCI Compliance & the Importance of Penetration Testing
StateTech Magazine

PCI Compliance & the Importance of Penetration Testing

State & local governments processing credit card payments need to know how to conduct a penetration test to maintain PCI compliance.\
Next-Generation Cybersecurity Defenses Coalesce for Space Systems
Via Satellite

Next-Generation Cybersecurity Defenses Coalesce for Space Systems

Experts are optimistic about the future of cybersecurity as it relates to space, despite growing concern over the modern threat environment.
FedRAMP Rev. 5: How Cloud Service Providers Can Prepare
Dark Reading

FedRAMP Rev. 5: How Cloud Service Providers Can Prepare

What cloud service providers need to know to prepare for FedRAMP Baselines Rev. 5, as documented in the new Transition Guide.
Data loss prevention vendors tackle gen AI data risks
CSO Online

Data loss prevention vendors tackle gen AI data risks

Businesses are using DLP tools to help secure generative AI and reduce risks of ChatGPT and similar applications.
How Informed is the Board of Directors on Cybersecurity Risks?
The Cybersecurity Readiness Podcast Series

How Informed is the Board of Directors on Cybersecurity Risks?

With the global cost of cybercrime expected to reach $10.5 trillion by 2025, cybersecurity has become a board-level imperative. According to the Diligent Institute survey 'What Directors Think,' board members ranked cybersecurity as the most challenging issue to oversee. Even though boards say...
Is basic cyber hygiene enough in the age of AI?
Authentic Press Network News

Is basic cyber hygiene enough in the age of AI?

For years, consumers and businesses alike have been given the same cybersecurity advice: use strong passwords, back up your data on a regular basis and use multi-factor authentication where you can. These three pillars are the foundation of what is referred to as cyber hygiene, and they help people keep…
Kayne McGladrey – Ask A CISSP Season 2 Episode 8
Ask A CISSP

Kayne McGladrey – Ask A CISSP Season 2 Episode 8

This week on Ask A CISSP, we have an interview with Kayne McGladrey, Field CISO at Hyperproof. In this very entertaining episode, we'll learn Kayne's amazing...
Emerging cyber threats in 2023 from AI to quantum to data poisoning
CSO Online

Emerging cyber threats in 2023 from AI to quantum to data poisoning

In cybersecurity’s never-ending cat-and-mouse game with hackers and grifters, the threats are always evolving. Here are some of the main attacks experts see as the biggest and baddest on the horizon.
Why end-to-end encryption matters
Help Net Security

Why end-to-end encryption matters

End-to-end encryption (E2EE) ensures that only two parties can access data, and helps to protect consumers and businesses from prying eyes.
The four pillars of cloud security
CSHub

The four pillars of cloud security

Exploring the cornerstones of the cloud security industry, cloud evolution and cloud migration
Universities Tap Student Talent to Support Security Operations
EdTech Magazine

Universities Tap Student Talent to Support Security Operations

Student-staffed security operations centers provide on-the-job training and valuable technology skills.
Generative AI: Cybersecurity Weapon, But Not Without Adaptable, Creative (Human) Thinkers
TechRepublic

Generative AI: Cybersecurity Weapon, But Not Without Adaptable, Creative (Human) Thinkers

Cybersecurity expert Kayne McGladrey speaks about why AI cannot do what creative people can, and the important role of generative AI in SOCs.
Tasks that bog down security teams (and what to do about them)
CSO Online

Tasks that bog down security teams (and what to do about them)

Budgetary and staffing issues are putting pressure on CISOs and other security leaders. Here are 10 tasks that typically bog cyber teams down and what some security chiefs did to solve the problems.