El Diario del CISO El Diario del CISO (The CISO Journal) Edición 1 | Page 7

EL DIARIO DEL CISO (THE CISO JOURNAL) Pensando y Trabajando por un Líder de Seguridad Digital INFLUENCERS How do I determine if an IP lookup service was used maliciously? Recently, I helped investigate some alerts for requests to the website ipify. For those of you who are not familiar with the service, essentially you can make a web request to site and it spits out the public IP address of the device 9 Reasons Cyberattacks are So Successful In a recent whitepaper, sponsored by SlashNext, Osterman Research conducted a survey of IT decision makers, and a few results stood out for us: How to become a Cybersecurity Thought Leader ****Original abbreviated article was publishedDecember 27th 2018on Forbes Magazines Technology Council Community Voice. Thought leaders are defined as informed leaders who are the go-to people in their field of expertise. The Dark Overlord makes 9/11 related threats It’s possible that I have acquired some breached data. What do you think? Does this look like an authentic legal communication related to the September 11th Word Trade Center attack to you? Is it still safe to fly? Data breach hits airline booking International travelers have every reason to be extra worried about their cybersecurity these days. Hotel bookings are all driven by computer systems these days, and so are airline bookings. Magic Cyber Pills Why autism education and Cybersecurity awareness training fails and how to solve it - UPDATED [2018-01-14]By Eh'den Biber “If you think you’re going to solve your cybersecurity awareness problem by technology How to learn about cybersecurity Many of you on Peerlyst are people who have been cybersecurity professionals for many years. But I also occasionally see people here who have never worked in cybersecurity but are very curious. Our field can be immensely overwhelming to newcomers.