El Diario del CISO El Diario del CISO (The CISO Journal) Edición 26 | Page 4
Influencers It is being challenged by emerging new regulations such as GDPR,
which are impacting all industry sectors, and the arrival on the scene
of the new role of the DPO in many firms.
Dan Lohrmann
Chief Strategist & Chief Security Officer at Security Mentor, Inc The complete article is here
Unmasking Cyber Fear – With Tips to Cut the FUD
After more than 30 years in the security industry, I must confess, I
am (sadly) still addicted to FUD. For example, one recent morning I
clicked (and tweeted) these cyber headline stories:
The complete article is here
Guy-Bertrand Kamga
Cloud Security Expert at Nokia
How to define effective Cloud Security Baselines
Since April 2018, I started a wonderful adventure on Peerlyst
community, consisting in the promotion and support of secure and
safe cloud adoption by organizations. Today, I took a moment to look
behind to see what has been accomplished so far, and I realized that
I released a couple of posts that can be helpful for those who are
looking for tips, thoughts, experiences, etc. related to the cloud
security domain. I intentionally decided to focus my posts on cloud
security topics related to all the three main aspects (process,
technology and people) of a cloud security strategy.
The complete article is here
JC Gaillard
Founder and MD - @CorixPartners;
What to look out for when hiring a new CISO?
The traditional role of the CISO is changing.
Charu Mitra Dubey
Founder @Initium
How Artificial Intelligence is Changing Cyber Security
With over 15% of the total enterprises leveraging AI, it has become a
matter of great debate whether AI is good or bad. Though AI was
originally coined in 1950, it has seen an exponential growth in the
past few years and people are concerned about how is it going to
affect the human life. Rumours are hovering all around regarding the
aspects of Artificial Intelligence. From Sophia, the bot to Alexa has
caught the eyes of people making them wonder how is this field
going to turn around.
The complete article is here
Brian Foster
Senior ICS Cyber Security Engineer
SECURITY PRACTICES FOR IEC 61131-3 PLC PROGRAMMING
LANGUAGES PART 4:
Within the industrial control systems (ICS), automation, operational
technology (OT), cyber-physical systems (CPS), industrial internet of
things (IIoT) and instrumentation communities many of the devices
with some form of computing and logical capabilities rely on 5
primary programming languages specific to programmable logic
controllers (PLCs) that are defined in IEC 61131-3 as Sequential
Function Chart (SFC),
The complete article is here