El Diario del CISO El Diario del CISO (The CISO Journal) Edición 34 | Page 7
EL DIARIO DEL CISO
(THE CISO JOURNAL)
Pensando y Trabajando por
un Líder de Seguridad Digital
diferente
International InfoSec & Cybersecurity News
Data Privacy and Security – Lawyers Still Lag in Information Security Risk Management
Digital readiness named top risk concern for businesses in 2019 Pentagon Considers Cybersecurity Certification for Its Contractors
Disorganized crime and state-backed hackers: How the cybercrime and cyberwar landscape is
constantly changing Recruiting in the age of the cyber security skills gap
eBook-cyberasbusinessenabler.pdf
Exclusive: Clues in Marriott hack implicate China - sources SamSam Ransomware
Facebook Used People’s Data to Favor Certain Partners and Punish Rivals, Documents Show Steps to strengthen Cybersecurity for Automobile Industry
Protecting our national identity assets is a matter of national security
Researchers: GDPR Already Having Positive Effect on Cybersecurity in EU
Security 2018 Surprises and 2019 Predictions (Part 2)
Fact or Science Fiction? Using your Thoughts to Enter a Password
Global cooperation needed to tame Wild West of cyberattacks
Huawei Is Said to Plan $2 Billion Cybersecurity Reboot
Knowledge Corner Spotlight - 31528 :: SEC: Strategic Security Advisory Services for CSOs
Marriott data breach sparks multibillion-dollar suits, with more to come
Mastercard and Microsoft say they're developing a universal identity management solution
The 4 Steps Of Incident Handling & Response – eLearnSecurity Blog
Top 7 IT Security Trends in 2019
TSA unveils cyber roadmap
US charges Iranian hackers for SamSam ransomware attacks
What are the differences between network security vs. cybersecurity?
What Can We Learn About Cybersecurity from the Challenger Disaster?
Everything.
What The Cybersecurity Of Our Critical Infrastructure Can Learn From The Climate
Change Debate
Mitigating Cybersecurity Risks In The Era Of GDPR
Wietse Venema & Dan Farmer, SATAN - Paul's Security Weekly #584
Who steals personal data and how do they make money from it?
What to Communicate About the Marriott Hack
When the Wrong Person Leads Cybersecurity
Multimedia Resources
Using the New 'Cybersecurity Profile'
Tool Cybersecurity in Healthcare: It's Time to
'Wake Up'
Financial institutions of all sizes can use a new
Cybersecurity Profile tool to help them comply with a
variety of regulations and implement the NIST Cybersecurity The healthcare sector is making progress in moving from a
reactive to a proactive approach to cybersecurity as it learns
lessons from other sectors, including
DanaBot evolves beyond banking
Trojan - Week in security with Tony
Anscombe Solving 3rd Party Cybersecurity Risk
Your organization's risk surface is larger than you think. How
can you get a handle on what risks exist, where they reside
ESET research shows that DanaBot operators have been
expanding the malware’s scope with new spam-sending
capability and possibly cooperating with another criminal
The Board as 'Fourth Line of Defense' in
Security 3 Top Security Challenges in Healthcare
-
Nandikotkur is an award-winning journalist with over 20
years' experience in newspapers, audio-visual media,
magazines and research. Chris Bowen, chief privacy and security officer, founder,
ClearDATA. Understanding where data is stored so it can be
protected
MDR: What to Ask When Choosing a
Vendor Cyber Exposure: How to Discover,
Measure and Reduce Your Risk
Hampered by insufficient tools and skills, many
organizations are now investing in managed detection and
response solutions How does one measure cybersecurity success? For too many
organizations, it’s simply the absence of a breach.
Emails Expose Sensitive Internal
Facebook Discussions Phishing, Ransomware Attacks Continue
to Menace Healthcare
A batch of documents meant to be kept under court seal
lays bare Facebook’s strategic brokering of access to user
data to reward partners and punish potential As the year winds down, phishing and ransomware attacks
continue to plague the healthcare sector, as illustrated by
recent breach reports.
Black Hat Europe: The Power of
Attribution
To combat cyberattacks, more nations must not only hold
nation-state attackers accountable, but also better
cooperate by backing each other's attribution
Top CIO Priorities for 2019
Broadband/wireless connectivity has moved up from seventh
on the strategies list last year to fifth this year
Lenny Zeltser, Minerva Labs – Paul’s Security Weekly #585
Lenny Zeltser the VP of Products at Minerva, will be giving a technical segment on Evasion Tactics in Malware from the Inside Out.
www.cisos.club
[email protected]