El Diario del CISO El Diario del CISO (The CISO Journal) Edición 9 | Page 9

News2 EL DIARIO DEL CISO (THE CISO JOURNAL) Thinking and Working for a Digital Security Leader Cybertalk Forbes Council Post: CISOs, Stop Focusing On Cybersecurity Council Post: Secure Software Design: The Next Frontier In Cybersecurity ExtraHop BrandVoice: “CIA”: Understand The Cybersecurity Triad In 5 Minutes Or Less New Cybersecurity Report Warns CIOs -- 'If You're Breached Or Hacked, It's Your Own Fault' Buzz about the grid generates uncertainty Deep Dot Web in deep water How to avoid the domino effect Winning strategies for a top-notch CISO and CFO alliance Information-Management Inforisktoday Bad bot cyber attacks increase in number and sophistication Cyber risk levels hold steady, though larger firms are prime targets Five software programs to improve the security of business websites Most organizations ill prepared to defend against cyber attacks Despite Doxing, Oilrig APT Group Remains a Threat Hackers Steal, Post Financial Data From Major Corporations Mystery Database Exposed Info on 80 Million US Households Deloitte Securitymagazine CRO Survey: Risk Management Value, Challenges & Trends Pursuing cybersecurity maturity at financial institutions The ascent of the CISO Physical and Cyber Convergence—At Last? Social Engineering Simulation Testing Tips Tipping the Scale for Effective Cybersecurity Cisomag Continuous innovation is the key to cyber safety Kenya announces cybersecurity guidelines for financial sector $3 Million HIPAA Settlement in Delayed Breach Response Case Laid Off Worker Pleads Guilty in Medicaid Incident Dataprivacysecurityinsider Trendmicro Diagnostic Medical Imaging Company Pays $3 Million to Resolve Potential HIPAA Violations Stemming from Data Breach Phishing Continues to Be Seen as Biggest Cybersecurity Threat to Companies This Week in Security News: BEC Attacks and Botnet Malware - This Week in Security News: Skimming Attacks and Ransomware - Tripwire Welivesecurity Cyber Security + Compliance Controls: What Does It All Mean, Rick? RobbinHood ransomware attack brings down parts of City of Baltimore's computer network Hackers steal US$41 million worth of Bitcoin from cryptocurrency exchange Turla LightNeuron: An email too far Securityboulevar McAfee Survey Finds IT at Cybersecurity Fault Most The CEO's Guide To Understanding Cyber Other News ‘CISOs should be able to reach out’ $40 million worth of Bitcoin stolen from Binance cryptocurrency exchange A ransomware attack is holding Baltimore's networks hostage Banks and Their Legal Obligations to Defend Against Cybercri Be wary of emails with links to ... er, Google Drive? Is that right? Bootstrap Business: How to Improve Security for Business and Prepare for All Threats Buckeye: Espionage Outfit Used Equation Group Tools Prior to Shadow Brokers Leak C-level execs being targeted by cyberattacks Cofense: Why it’s time for everyone to defend against phishing Crippling ransomware attacks targeting US cities on the rise Cybersecurity Awareness: A Critical Piece of the Security Puzzle Cybersecurity Jobs Abound. No Experience Required. Cybersecurity Skills Shortage Worsening for Third Year In A Row, Sounding the Alarm for Business Leaders Evaluaciones de Hogan: los 8 rasgos de personalidad para tener éxito en la ciberseguridad FBI Seize DeepDotWeb For Taking Commissions From Illegal Sites FBI Shutters DeepDotWeb Portal; Suspected Admins Arrested Filling the digital transformation skills gap Five free ways SMEs can improve their cyber security Google Online Security Blog: Quantifying Measurable Security Hackers linked to China repurposed NSA's cyberweapons, report says Help the Security Effort By Becoming an IoT Researcher How to Comply with GDPR How to Get Your Employees On Board with Cyber Security In the absence of a secure culture, reducing cyber risk could be impossible Indian corporates seek to bridge skill gap in cyber security management Invisible Malware Is Here and Your Security Software Can't Catch It Is anti-virus obsolete? LulZSec hackers published sensitive data from 30,000 Roman lawyersSecurity Affairs Marriott doesn't pay a price for massive data breach Microsoft SharePoint vulnerability allows hackers to sift through servers, Saudi authorities warn Millions of Chinese-made devices, including baby monitors, vulnerable to hacking: study MN: American Baptist Homes of the Midwest notifies patients and residents of ransomware incident Month Long Attack on Microsft SharePoint Servers NASCIO Day 2: Hard Transformations and ‘Soft’ Skills Nicaragua: 11,000 Bots Slam La Prensa in 'A Direct Attack' No reason to ship credit card data to third parties, says expert Oversight and Management of Cybersecurity Risks for Board of Directors/Decision Makers Piracy streaming apps are stuffed with malware Report: Chinese Hackers First to Use NSA Cyberattack Tools Russia-Linked Hackers Using Sophisticated Backdoor To Hijack Exchange Servers Russian cyberspies are using one hell of a clever Microsoft Exchange backdoor Students pull off below-the-belt mailing list prank The 4 pillars of a lasting cyber security transformation The Greatest Risk Is Not Doing a Risk Assessment The Secret CSO: Roger Hale, Informatica The State of Cyber Security Incident Response The Strange Journey of an NSA Zero-Day—Into Multiple Enemies' Hands Triton is the world’s most murderous malware, and it’s spreading We aren't prepared for the next wave of cybersecurity risks Why Cybersecurity Startups are Picking Up Growth in SEA Why it’s time for organisations to rethink their cybersecurity strategy Why You Should Constantly Enrich Security Culture Throughout Your Organization Your Financial Org Needs Security Awareness Training More Than Ever www.cisos.club [email protected]