El Diario del CISO El Diario del CISO (The CISO Journal) Edición 33 | Page 12

U.S. Air Force announced Hack the Air Force 3.0, the third Bug Bounty Program Understanding the art of phishing USB Malware Risk for 44% of Industrial Facilities What’s the difference between a risk assessment and a business impact analysis? Who owns application security? Why Israel is a Leader in Cybersecurity www.cyberdefensemagazine.com www.itproportal.com www.cbronline.com www.itgovernance.co.uk www.networksasia.net blogs.timesofisrael.com Multimedia Resources Blockchain: The Good, the Bad and the Legal www.careersinfosecurity.com As organizations investigate public and private blockchains to secure transactions and facilitate peer-to-peer transactions Business Email Compromise: Must-Have Defenses www.databreachtoday.com Want to better block business email compromise - CEO fraud - attacks outright, as well as be able to spot and respond more quickly to any BEC attacks that get Corin Imai, DomainTools - Paul's Security Weekly #582 - Security Weekly securityweekly.com Corin Imai is Sr. Security Advisor for DomainTools. Corin began her career working on desktop virtualization, networking, and cloud computing technologies before delving into security Episode 50: CISCO ASA 0-day and VirtualBox Vulnerability soundcloud.com Michael Marriott flies in from San Francisco to cover the big vulnerability and exploit stories of the week. The team discuss the Cisco denial- of-service vulnerability affecting its Adaptive Security Eyal Neemany, Javelin Networks - Paul's Security Weekly #582 - Security Weekly securityweekly.com Former Head of Israeli Air Force CERT & Forensics Team, Senior Security Researcher at Javelin Networks. How Cyber Insurance Is Changing in the GDPR Era www.bankinfosecurity.com