El Diario del CISO El Diario del CISO (The CISO Journal) Edición 19 | Page 4
Influencers
Rob Black
Cybersecurity business leader
Typeform Data Breach: 100,000 Records and Counting
The list of customers affected by the Typeform data breach has
grown in the past week. So has the number of personal records
exposed. This article aims to collect all of this data in one location..
The complete article is here
Seth Jaffe, CBCP, JD
official rocket scientist in residence
Cyber security roi: it may happen sooner than you think
You’ve heard it before. Companies are slow to invest in cyber
security because they see few returns.[1] But that is likely to
change, and it may occur sooner than we expected.
Let’s first set the context. An executive recently made the comment
to me that “cyber security is just another cost of doing business in
the modern environment.” And to many institutions, that’s exactly
how they see it. A decade or so ago, they did not have to worry
about cyber theft, ransomware, or nation state attacks. But now,
boards of directors list cyber security as the risk most likely to keep
them awake at night. Moreover, even taking the cost out of it,
companies are finding it difficult to secure experienced information
security personnel..
The complete article is here
Tony Martin-Vegue
I solve really hard infosec problems w/ risk science, math,
economics and luck.
How to Lie with Statistics, Information Security Edition
Have you ever finished reading a vendor whitepaper or a research
institution’s annual security report and felt your Spidey sense begin
to tingle with doubt or disbelief after reading some of the
conclusions or research methodology? What you are probably
sensing is a manipulation of statistics, an age-old hoodwink that has
been occurring as long as numbers have been used to convey
information. .
The complete article is here
Isiah Jones & Brian Foster
Controls Engineer and OT/ICS Security Engineer
Security practices for iec 61131-3 plc programming languages
part 2: ladder logic
If you are still trying to Identify all the risks you are exposed to
within the context of your business or spend endless hours
converting historic data into useless risk reports in an effort to
mitigate as much risk as possible for a green light on the road to
taking less risk (for less reward); spending a fortune on controls and
the digging of trenches for your lines of “defense”…. Fear no more!.
The complete article is here