El Diario del CISO El Diario del CISO (The CISO Journal) Edición 7 - Page 11

Influencers EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader INFLUENCERS Breaking into InfoSec: A beginners guide to all things Cyber Security "So you wanna be an "Infosec Rockstar"? And live large. Find zero days and drive fast cars?" Sorry, but thats not going to happen here. Common question: What cert(s) should I get? I recently had a discussion around certifications with one of the people I'm mentoring, and thought it might be worth summarizing here. Gustuff banking trojan was just discovered and it likely targets your bank On March 28th, Group-IB reported a newly discovered banking trojan called Gustuff. Well, “newly discovered” is subjective. How much Job Experience do I need? I have been in IT for over 15 years working as a desktop analyst. I have a BS in Computer Information Technology. I am a CISO! I don’t need board room access just for the heck of it! The CEO of a company is damn happy that they just finished the process of taking over a well known company. Plaintext passwords and Facebook... Why am I not surprised? How many times can I **headdesk** before I leave a forehead shaped imprint in my office desk? Earlier this week, MySpace announced that they had lost all of the music files uploaded to the platform up until about 2015 Security for All Sizes: Which Antivirus Is Best? I remember the first time I saw an AI antivirus program. I was amazed, impressed, and sure that it would be something we'd want to use back at my day job Why you really need trust and influence in cybersecurity 'Will you walk into my parlour?” said the Spider to the Fly, 'Tis the prettiest little parlour that ever you did spy; Multimedia Resources (Podcast and Interviews) Highlights from RSA Conference 2019 USA | RSA Conference The Dark Side of Cybersecurity: Burnout Raising the Corporate Security Understanding Inside the Cybercrime Support Network Addressing the Critical Need for Cybersecurity Skills Training FBI's Palmore on Leadership and Diversity Sophos Cyber Threat Report: A Proactive Approach To Stop Lateral Movement Attacks Defense in Depth: CISO Burnout If At First You Don't Succeed, There's Always Blackmail Defense in Depth: Tools for Managing 3rd Party Risk 5 Ways Cybercriminals Can Access Your Emails Without Phishing Analyzing the $7.5 Million UCLA Health Data Breach Settlement The Need to Focus on Detection, Remediation Week in security with Tony Anscombe | WeLiveSecurity Inside Netscout's Threat Report Enterprise Security in the Era of Digital Transformation Why Simpler is Better for CISOs GDPR: Data Breach Notification 101 The Future of Cybersecurity Education - Part 1 The Future of Cybersecurity Education - Part 2 Securing the Hyper-Connected Enterprise "Hijacked motel rooms, ASUS PCs, and leaky apps" Silk Road with Deliveroo 30 Security Vendor Behaviors That Set Off a CISO’s BS Detector When Abusing Our Privacy, Does Size Matter? Is US Foreign Cyber Policy on Track? ESG Data Point of the Week