El Diario del CISO El Diario del CISO (THE CISO JOURNAL) EDICIÓN 2/19 | Page 6

EL DIARIO DEL CISO (THE CISO JOURNAL) Pensando y Trabajando por un Líder de Seguridad Digital Cybertalk Cities as cybersecurity targets Education sector is becoming an attractive target for hackers FaceTime bug prompts Apple to close down group chats until fixed Three trends for CISOs to keep in mind Healthdatamanagement Information-age Security remains a top concern for healthcare IT professionals Why many cybersecurity programs fall short on protection CEOs and cyber security: are they the weakest link? How deception changes the rules of engagement in cyber security Healtcareinfosecurity US citizen leaks data of 14,200 HIV+ patients in Singapore Securityintelligence Attack Campaign Targets Linux Servers to Install New SpeakUp Trojan Apple Slams Facebook for Monitoring App Given to Minors HIV Data Exposed Online Other News Break Through Cybersecurity Complexity With New Rules, Not More Tools Cybercriminals Generated $56 Million Over 12 Years From Monero Crypto-Mining Malware Geodo Botnets Using New Spam Campaign to Deliver Qakbot Malware 2018 Trends Overview: Compliance, Privacy and Security Family Tree 250 Webstresser Users to Face Legal Action 5 Common Cyber Security Threats That Bypass Legacy AV 5 Reputational Risk Predictions for 2019 Social Engineering Testing: Why Getting Hacked Is a Security Advantage 7 cybersecurity startups to bet your career on in 2019 Forbes 8 technologies that an organization can adopt to help address its cybersecurity challenges Cybersecurity Decision Makers Viewed As Police Or Doom Mongers By Colleagues CISO Liz Joyce: Cybersecurity leadership requires more than technical chops Mac Users Being Targeted By A Sneaky Image-Based Malware Attack CISO series: Talking cybersecurity with the board of directors Raising Trust In Security And Privacy In A Distracted World Cyber insurance adoption lags as businesses require convincing The Largest Security Risk To Your Organization, And How To Fix It Cyber Risk Challenges: Are You Ready? Understanding The Implications Cyberwarfare Has On Your Cybersecurity Strategy Cybersecurity in Manufacturing: Targeting Trade Secrets and New Technology Cybersecurity isn’t just for ‘tech people’ anymore. Here’s why. Securereading Enterprises Move (Slowly) Toward Stronger Cybersecurity, Research Shows Four Ways to Curtail Insider Cybersecurity Threats Facetime Bug Allows you to Hear the Audio even before Accepting the Call New Collection of Databases containing 2.2 billion records Discovered on Hacker Forums Hacker, cybersecurity CEO shares story in 'Breaking and Entering' Hidden Casualty of the Shutdown: America’s Cybersecurity Over 9000 Cisco RV320 and RV325 Routers Vulnerable to Attacks Hospitals to medtech: Clean up your cybersecurity act State Bank of India Data Leak Exposed Financial Details of Millions of Customers How a piece of Brazilian malware became a global cybercrime export How to Grow the Next Generation of Cybersecurity Talent Databreachtoday How to protect yourself this Data Privacy Day Apple Rushes to Fix Serious FaceTime Eavesdropping Flaw How to start a cybersecurity program (or restart one that lapsed) Fileless Malware: What Mitigation Strategies Are Effective? Improving Cybersecurity Means Taking More Care with What We Digitize New Medical Device Cybersecurity Framework Unveiled Intelligence Chiefs Expect More Cyberattacks Against US Is cybersecurity more important than cost, schedule or performance? Focal-point.com Japan’s IoT Security Strategy: Break Into Devices Managing your cyber-security as an SME 2018 in Review: A Year of Internal Penetration Testing Meet the hacker mom big companies hire for cybersecurity Prevention Is the Best Medicine: A Guide to SAP Security Health Checks New Mac malware aims to steal credit card credentials and passwords Understanding the Differences between PIAs and the GDPR's DPIAs On Data Privacy Day, here's a reminder that you have none Orange Buys UK's Largest Independent Cybersecurity Company, SecureData ITspmagazine OSFI Releases Advisory on Technology and Cybersecurity Incident Reporting Obligations Cybersecurity as a Branding Value for Companies. It is not a cost, it is an investment. Pentagon's Cybersecurity Found Unable to Stay Ahead of Attackers Data Privacy Day 2019 Potential global cyber attack could cause $85 billion-$193 billion worth of Operationalizing IoT Security Using The OWASP Top 10 Project damage: report Dataprivacyandsecurityinsider Report: San Antonio could be 'global industry leader' in cybersecurity, IT Report: San Antonio’s cyber, IT firms hurting for trained workers Data Privacy & Security Considerations in Mergers & Acquisitions Due Diligence Senators ask Trump administration how badly shutdown hurt federal Privacy Tip #175 – Data Privacy Day cybersecurity Sammamish, Washington Declares Emergency After Ransomware Attack Siri Shortcuts can be abused for extortion demands, malware propagation The Biggest Data Breaches in Asia 2019 Techrepublic The C-suite could be the blind spot in your cyber security strategy The Critical Role of Cybersecurity in Keeping Public Works Operational How to stay safe from Super Bowl-related cybersecurity risks The Internet of (Wonderful and Scary) Things Top 5 ways people are okay sharing data Things CISOs Should Keep in Mind, for 2019 Too few cybersecurity professionals is a gigantic problem for 2019 Computerweekly True Colors of Cyber Security Podcast Cyber insurance uptake growing, but not all firms convinced Secrecy Reigns as NERC Fines Utilities $10M citing Serious Cyber Risks Massive uptick in cyber attacks targeting Student Loans Company Vulnerability Summary for the Week of January 21, 2019 Why Controlling Time Matters Why Cybersecurity is Essential to an Organization Your must-have IoT security checklist: ENISA’s online tool for IoT and Smart Infrastructures Security www.cisos.club [email protected]