VB's Péter Szőr Award commemorates the life and work of great security researcher Péter Szőr and is awarded for the best piece of technical security research published during the preceding year. Know an individual or a team who's published some great technical security research within the last year? Why not nominate them for the 2024 award? https://lnkd.in/e5RF3J4w
Virus Bulletin’s Post
More Relevant Posts
-
I am truly honored to have received a fellowship at the Chartered Institute of Information Security (CIISec) helping to continuously raise standards in the profession. During my career I have had the opportunity to work in different industry verticals, in a number of technology and security roles at differing levels of seniority. One aspect that has been central to my career progression is curiosity and the field of technology and cyber requires a growth mindset and continuous development. Embracing new innovation is at the heart of business growth and what continuously requires attention is the importance of cyber security. The understanding of this professionalism not only lives inside the security team in your organisation, but across all aspects of your business , so that collectively we can protect the digital ecosystem driving global commerce.
🎉 Join us in congratulating Ashish Surti, our talented Chief Digital and Information Officer, as he is awarded a fellowship by the esteemed Chartered Institute of Information Security (CIISec). It’s the highest level of attainment in CIISec’s membership. Learn more about the CIISec here 👉 https://brnw.ch/21wITZc
To view or add a comment, sign in
-
Last month, Eileen Tanghal participated in a panel titled "Gamechangers: Understanding the Convergence of Technologies and National Security Implications" at the Center for Strategic and International Studies (CSIS) Global Security Forum. Read our latest news story and watch the panel on-demand ⬇
To view or add a comment, sign in
-
Here's the line up of speakers for the Association of University Chief Security Officers (AUCSO). Their 40th Annual Conference, on the theme of ‘Unveiling the Added Value of Security Services’, will https://lnkd.in/e2mwASWg
To view or add a comment, sign in
-
Meet Doug G. Our Chief Trust Officer, and discover how he keeps Lionbridge's #cybersecurity operations ahead of the curve. Read the Blog
Meet the Pride: Doug G. — Chief Trust Officer
lionbridge.sociuu.app
To view or add a comment, sign in
-
WATCH: The Roles, Challenges & Collaboration of the Chief Security Officer with Kirk McClain, Rich McComb - https://lnkd.in/eMQVijSJ In this virtual video panel series, WashingtonExec sits down with industry and public sector leaders to discuss current challenges, innovations and initiatives top of mind across the government IT landscape. WashingtonExec’s Amanda Ziadeh is joined by Kirk McClain, chief security officer of Accenture Federal Services, and Richard McComb, CSO of the U.S. Department of Homeland Security, to discuss the roles, challenges and collaboration of the CSO role in government and industry. Tune in as both panelists discuss the scope of their respective roles and priorities, and the top challenges they’re facing as threats increase and security systems remain increasingly target-rich. McClain and McComb share how they’re tackling these challenges and what is meant by the term “more security is better.” Plus, they discuss how industry and government can work together to further protect security programs and improve security postures in both sectors.
The Roles, Challenges & Collaboration of the CSO in with Kirk McClain, Rich McComb
https://www.youtube.com/
To view or add a comment, sign in
-
Cybersecurity Professional, CodeRGV/Girls Who Code Volunteer, Code.org CS Teacher, and AmeriCorps Alum
Great article by Jen Easterly and Eric Goldstein:
Stop Passing the Buck on Cybersecurity
foreignaffairs.com
To view or add a comment, sign in
-
"Thrilled to be named a finalist for this year's Top 100 Information Security Professional Award alongside so many incredible professionals! 🎉 This recognition is a testament to the power of teamwork, collaboration, and the inspiring individuals I've had the privilege to work with. To my colleagues, teammates, and mentors, this one's for all of us. Let's continue to create positive impact together! You can vote using this link: https://lnkd.in/egdSTtSW 🚀 #Finalist #Teamwork #Gratitude #OnConIconAwards #OnConferences"
Top 100 Information Security Professional Award Voting
onconferences.com
To view or add a comment, sign in
-
“...It is possible that vital information could be encrypted or held hostage, putting patients' lives in danger...” ~Mack Jackson, cybersecurity speaker, business consultant, and author shares his knowledge on ransomware attacks to healthcare providers. To read Mack’s informative full article, click on this link https://lnkd.in/gY8Ahp2f and get your FREE access to Empowering Humanity Magazine™ Now!
Magazine – Empowering Humanity TV
https://empoweringhumanitytv.com
To view or add a comment, sign in
-
“It is possible that vital information could be encrypted or held hostage, putting patients' lives in danger.” ~Mack Jackson, cybersecurity speaker, business consultant, and author shares his knowledge on the ransomware attacks to healthcare providers. To read Mack’s full article, click on this link https://rb.gy/e6xbbu and get your FREE access to Empowering Humanity Magazine™ Now!
Magazine – Empowering Humanity TV
https://empoweringhumanitytv.com
To view or add a comment, sign in
-
Cyber Risk & GRC specialist @ Elasticito | GRC Ambassador of the Year Award 2024 | Cybersecurity & GRC advocate | Hundreds happy customers in BeNeLux, DACH, Nordics, and Balkans | DORA Explainer | B2B
This is really a must-read for anyone who can't sleep at night because of worries about ransomware attacks. If you are too frazzled, here are my main take-aways / Key Points: - Ransomware groups operate with sophistication rivalling legitimate tech start-ups, offering customer support services and employing go-to-market-like strategies. - Healthcare-related organizations are increasingly targeted, defying traditional avoidance codes. - Repeat victimisation is prevalent, with numerous companies targeted by multiple ransomware groups. - Small organizations, with revenues under $20 million, constitute a significant portion of ransomware victims. - Ransomware-as-a-service (RaaS) operators dominate, dictating terms as new entrants emerge. - Victim counts have doubled year over year, signalling an accelerating threat environment. - Proactive measures and adaptability are essential to navigate the evolving ransomware landscape. Action Points are rather straight-forward and "obvious": - Implement proactive measures, such as continuous (vendor) monitoring and risk prioritisation, to mitigate ransomware risks and safeguard business operations. - Stay vigilant and adapt strategies to combat evolving ransomware threats, emphasizing collaboration and proactive defence measures.
Our Chief Research & Intelligence Officer, Ferhat Dikbiyik, Ph.D., CTIA, dug through every disclosed third-party breach from 2023, so you don’t have to. He outlines key takeaways and work that still needs to be done. Check it out now: https://lnkd.in/gQAvnuHy
2024 Third-Party Breach Report Key Takeaways
blackkite.com
To view or add a comment, sign in
1,763 followers
Associate Manager, Threat Research at Agoda | ankitanubhav.info
2moI was lucky enough to meet him while I started my career, and he had joined McAfee and had come to give us some of his wisdom. Gone too early and an award worth his legacy.