El Diario del CISO El Diario del CISO (The CISO Journal) Edición 16 | Page 9

Noviembre (November), Volumen 16/2019 Fuentes de Información / Sources Noticias #BSidesBelfast: We Need Security Capabilities For Our Whole Lifetime #ISC2Congress: CISOs Are Forgetting to Be Human #ISC2Congress: Cybersecurity Education Requires a Transdisciplinary Approach #ISC2Congress: Cybersecurity Recruitment Is in a Dangerous Crisis Noticias #ISC2Congress: Hero Pilot Schools Cybersecurity Professionals 9 Ways Data Vampires Are Bleeding Your Sensitive ... #ISC2Congress: The Truth Behind the Lack of Women in Cybersecurity Accounting Scams Continue to Bilk Businesses £265m Data Breach Costs Could Have Been Avoided with £9600 Worth of Bug Bounties Attack on Indian Ed Tech Firm Exposes 687K Users 10 'Secure' Ways to Start a Conversation 4 Security Lessons Federal IT Pros Can Teach the ... 4 Ways to Soothe a Stressed-Out Incident Response Team 5 Things the Hoodie & the Hard Hat Need to Know ... Facebook Sues Spyware Maker Over WhatsApp Exploit Building a Cybersecurity Culture: What's Love Got ... Facebook: Developers Wrongfully Accessed User Data Fast-Food Chain Krystal Investigates Card 'Security Incident' Capital One Shifts Its CISO to New Role BBC News Goes Dark with Tor Site Cybersecurity's 'Moral Imperative' Building a Security Testing Plan Database Error Exposes 7.5 Million Adobe Customer ... Details of Attack on Electric Utility Emerge Disclosure Does Little to Dissuade Cyber Spies Curbing Insider Insecurity Enterprise Web Security: Risky Business Cybersecurity Risk is Growing, and We Are Not Ready Cybersecurity Skills Shortage Tops Four Million Drivers' Data Exposed in 7-Eleven Fuel App Breach Drone Wars: Experts Warn of Flying Network Security Threat Facebook Admits Another Developer Privacy Snafu Facebook Finally Pays £500K Cambridge Analytica Fine Facebook Takes Spyware Firm NSO Group to Court Fakes, Privacy Awareness and Disaster Relief Predicted for 2020 Fashion Site Sixth June Leaking Card Data to Magecart Hackers German Automation Giant Still Down After Ransomware Attack Global Registrar Web.com Suffers Major Breach Is the Next Generation Ready to Deal With Malware? Major Cyber-Attack on APAC Ports Could Cost $110bn Facebook Says Israeli Firm Was Involved in Recent ... Find New Talent, Don't Fight Over CISSPs: Insights ... Midwest to Get First Cyber Battalion The Cold Truth about Cyber Insurance Millions of Adobe Customers Exposed in Privacy Snafu Most Effective Phishing Tactic Is to Make People Think They've Been Hacked Noticias 50% of apps will not be migrated to the cloud A continuous problem: Tackling the cybersecurity skills shortage Companies should disclose cybersecurity risk management efforts Container usage has grown in complexity, specific security controls are needed Cybercriminals are testing exposed Chinese APT Group Targets Mobile credentials for future account takeover Networks: FireEye Mandiant attacks Cybercriminals using custom phishing Combating Cybercrime: Key Challenges for tools to target the world’s largest tech 2020s and Beyond brands As Phishing Kits Evolve, Their Lifespans Shorten AWS Customers Hit by Eight-Hour DDoS Cash-back Websites Expose 2 TB of Sensitive Information Chartered Institute: IT Security Industry is Stagnating Noticias 12-Year Prison Term for Hacking LA Court System Alleged Capital One Hacker Released From Prison Beam Me Up, Alexa: Digital Assistants Hacked By Lasers Business Email Compromise: Battling Advanced Attackers First Bluekeep Exploit Found in the Wild Free & Discounted Security Services Now Available ... Hacking Phones: How Law Enforcement Is Saving Privacy Hospital Cyberattacks Linked to Increase in Heart ... How HR and IT Can Partner to Improve Cybersecurity New Office 365 Phishing Scam Leaves A Voicemail Quantifying Security Results to Justify Costs Raising Security Awareness: Why Tools Can't Replace ... Ransomware Attack Hits Las Cruces, New Mexico ... Security Pros Fear Insider Attacks Stem from Cloud Apps Siemens PLC Feature Can Be Exploited for Evil - and ... The Edge The Real Reasons Why the C-Suite Isn't Complying ... Defining risk controls that actually work Download PPT template: Build your 2020 security plan Employees know vulnerabilities exist, but they can’t resolve them quickly enough Europol: Spear phishing the most Following Massive Breach, Capital One prevalent cyber threat affecting orgs Replacing CISO: Report across the EU Here's Why 'Raccoon' Infostealer Is Examining security process maturity in 400 Popular With Criminals organizations Italy’s UniCredit: Breach Went Undetected How can security teams effectively for Four Years monitor OT and ICS networks? Johannesburg Struggles to Recover From How has your organization's risk level Ransomware Attack changed in the past 12 months? Joker's Stash Lists 1.3 Million Stolen Indian IaaS cloud vulnerabilities expected to Payment Cards increase 50% over 2018 figures Integrating security into IoT projects is not Latest BEC Victims: Nikkei, City of Ocala easy, but it's increasingly urgent Massive Cyberattack Slams Country of IoT is an ecosystem, as secure as its Georgia weakest link McAfee: Malicious Voicemails Target Is the enterprise on the brink of a global Office365 Users web supply chain attack? NordVPN Says Server Compromised Due Keeping up with the evolving ransomware to Misconfiguration security landscape Phishing Campaign Uses Salary Increase Leading domain name registrars suffered Ploy: Report data breach Pwn2Own Contest to Focus on Industrial Majority of 2019 breaches were the result Control Systems of unapplied security patches Ransomware Gangs' Not-So-Secret Attack Most organizations plan to increase their Vector: RDP Exploits cybersecurity budgets in 2020 Ransomware: Average Ransom Payout People are the very first element in a Increases to $41,000 pragmatic cybersecurity strategy Skimming Malware Found on American Phishing attacks at highest level in three Cancer Society Webstore years 'Soviet Tactics': Russia Tries Prisoner Swap Security and risk compliance: Still the most for Hacker important part of IT strategy Security services and network security still Three Charged in $11 Million BEC Scam top spending priorities for CISOs in MENA Trend Micro Employee Sold Consumer The digital economy is approaching a Data to Scammers critical tipping point Two Data Leaks Expose Millions of The nastiest ransomware, phishing and Records botnets of 2019 The promise and peril of post quantum Two Uber Hackers Plead Guilty computing Why Is Third-Party Risk Management So Want to overcome patching challenges Complex? once and for all? Automation is the key Zappos' Offer to Breach Victims: A 10 Alexa, Siri, Google Smart Speakers Hacked Percent Discount Via Laser Beam 9