Latest from todaynewsWarning to FortiGate admins: You need to run a compromise assessment now This comes after stolen configuration data and passwords from a two-year old hack were leaked last week.By Howard Solomon23 Jan 20255 minsCyberattacksData BreachRisk Management feature 7 top cybersecurity projects for 2025By John Edwards21 Jan 20258 minsCloud SecurityData and Information SecurityIT Governancefeature Stop wasting money on ineffective threat intelligence: 5 mistakes to avoidBy Ericka Chickowski15 Jan 202510 minsBudgetRisk ManagementThreat and Vulnerability Management newsGenAI strategies put CISOs in a stressful bindBy Evan Schuman 14 Jan 20255 minsCSO and CISOGenerative AIRisk Management featureCISOs embrace rise in prominence — with broader business authorityBy Esther Shein 13 Jan 202511 minsBusiness IT AlignmentCSO and CISOIT Strategy featureThe 7 most in-demand cybersecurity skills todayBy Eric Frank 12 Dec 202411 minsApplication SecurityCloud SecurityCompliance feature11 biggest financial sector cybersecurity threatsBy John Leyden 20 Nov 202411 minsPhishingRansomwareRegulation featureThe 10 biggest issues CISOs and cyber teams face todayBy Mary K. Pratt 28 Oct 202410 minsCSO and CISOCyberattacksRegulation news analysis77% of CISOs fear next big breach will get them firedBy Evan Schuman 28 Oct 20243 minsCSO and CISOData BreachIncident Response Articlesfeature7 risk management mistakes CISOs still makeGiven its importance and complexity, risk management is a trap door for many CISOs. Here are seven ways to keep your enterprise from inadvertently falling into a security crisis.By John Edwards 22 Oct 2024 8 minsRisk ManagementSecurityfeatureCyber insurance explained: Costs, terms, how to know it’s right for your businessCyber insurance can’t protect your organization from cybercrime, but it can keep your business on stable financial footing should a significant security event occur.By Mary K. Pratt, Michael Hill and John Leyden 10 Oct 2024 14 minsRisk ManagementfeatureChief risk storyteller: How CISOs are developing yet another skillCybersecurity risks are critical to communicate, but CISOs are finding crafting a narrative that resonates requires more than technical expertise.By Rosalyn Page 07 Oct 2024 9 minsCSO and CISOIT LeadershipRisk ManagementfeatureWhen technical debt strikes the security stackThe bigger the cybersecurity technical debt the bigger the risk of being exposed to security flaws. Experts share how to reduce the debt therefore reducing risk.By Ericka Chickowski 25 Sep 2024 12 minsCSO and CISORisk ManagementopinionPreparing for the next big cyber threatThe chair of OT-ISAC Executive Committee outlines how to build a robust cyber resilience strategy to protect against ransomware, data breaches and emerging AI-powered attacks.By Steven Sim 17 Sep 2024 6 minsEncryptionRisk ManagementThreat and Vulnerability ManagementfeaturePatch management: A dull IT pain that won’t go awayFollowing basic security practices for patch management strategies is only partially solved by better tools and culture shifts, say IT experts.By John Leyden 16 Sep 2024 9 minsPatch Management SoftwareRisk ManagementnewsMastercard acquires Recorded Future: How will threat intelligence transform the payments industry?The significance of the acquisition lies in Recorded Future’s ability to provide real-time intelligence and parse vast amounts of data from across the web — including the dark web.By Taryn Plumb 12 Sep 2024 6 minsRisk ManagementThreat and Vulnerability ManagementopinionThird-party risk management can learn a lot from the musk oxBy taking a ‘musk ox approach’ to protecting ourselves collectively, CISOs can help safeguard key third-party service providers they hold in common, thereby reducing business risks. By David Gee 10 Sep 2024 7 minsRisk ManagementfeatureAdobe evolves its risk management strategy with homegrown frameworkThe software maker’s Security Risk Management Framework (SRMF) helps leadership prioritize mitigation decisions and ensures everyone is informed about the latest cybersecurity challenges and risks.By Bob Violino 06 Sep 2024 6 minsCSO50Risk ManagementfeatureHow to ensure cybersecurity strategies align with the company’s risk toleranceOne of the tenets of risk tolerance is considering the fallout of something going wrong. The risk may originate as a technical one, but for CISOs the challenge is deciphering the organization’s tolerance for the impact.By Rosalyn Page 03 Sep 2024 10 minsCSO and CISORisk Managementhow-to3 key strategies for mitigating non-human identity risksFor every 1,000 human users, most networks have around 10,000 NHIs, and that can be a huge task to manage. Here are 3 fundamental areas to focus on when securing NHIs. By Chris Hughes 22 Aug 2024 6 minsData and Information SecurityIdentity and Access ManagementRisk ManagementnewsMIT delivers database containing 700+ risks associated with AI Called the AI Risk Repository, the goal, its creators say, is to provide an accessible and updatable overview of risk landscape.By Paul Barker 15 Aug 2024 6 minsRisk Management Show more Show less View all Resources whitepaper Download the AI Risk Management Enterprise Spotlight In this issue, we explore the risks to both IT and the business from the use of AI. The goal of your risk management efforts should be to gain the most value from AI as a result. The post Download the AI Risk Management Enterprise Spotlight appeared first on Whitepaper Repository –. By Foundry Editorial 01 Feb 2025Artificial IntelligenceIT GovernanceRisk Management whitepaper How modernizing financial risk assessment platforms increases productivity and improves accuracy By Slalom + Snowflake 13 Dec 2024Business OperationsFinancial Services IndustryRisk Management whitepaper Managing Human Risk By Mimecast 06 Dec 2024Business OperationsHuman ResourcesRisk Management View all Video on demand videoWhat is the NIST Cybersecurity Framework? How risk management strategies can mitigate cyberattacksRecently, U.S. Cyber Command confirmed it has acted against ransomware groups, underscoring the importance of cybersecurity to national security. Effective risk management frameworks, such as the NIST Cybersecurity Framework, can help organizations assess risk and mitigate or protect against ransomware attacks or other cyber incidents. Cynthia Brumfield, analyst, CSO Online contributor and author of the new book, “Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework”, joins Juliet to discuss what the NIST framework is and how IT teams can apply its advice to best protect their organizations. 21 Dec 2021 18 minsRisk ManagementSecurity How chemical manufacturer Celanese secures its IT and OT environments 17 Sep 2021 28 minsRisk ManagementSecurity Securing the software supply chain: A structured approach 18 Jun 2021 25 minsRisk ManagementSecuritySupply Chain Strategies for elevating security to an evergreen business priority 16 Apr 2021 23 minsIT LeadershipRisk ManagementSecuritySee all videos Explore a topic Application Security Business Continuity Business Operations Careers Cloud Security Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy View all topics Show me morePopularArticlesPodcastsVideos news Backdoor in Chinese-made healthcare monitoring device leaks patient data By Lucian Constantin 31 Jan 20255 mins Healthcare IndustryVulnerabilities brandpost Sponsored by Tanium How CISOs can fight burnout and extend their careers By David Rand 31 Jan 20259 mins Security news VMware offers fixes to severe vulnerabilities in VMware Aria By Shweta Sharma 31 Jan 20253 mins SecurityVulnerabilities podcast CSO Executive Sessions: Guardians of the Games – How to keep the Olympics and other major events cyber safe 07 Aug 202417 mins CSO and CISO podcast CSO Executive Session India with Dr Susil Kumar Meher, Head Health IT, AIIMS (New Delhi) 17 Jul 202417 mins CSO and CISO podcast CSO Executive Session India with Charanjit Bhatia, Head of Cybersecurity, COE, Bata Brands 08 Jul 202418 mins CSO and CISO video CSO Executive Sessions: How should software solution providers keep themselves and their enterprise clients safe? 26 Jan 202518 mins Security video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 2) 14 Nov 202415 mins Critical InfrastructureIT GovernanceSupply Chain video CSO Executive Sessions: Open Source Institute’s Eric Nguyen on supply chain risks to critical infrastructure (Part 1) 04 Nov 202419 mins Critical InfrastructureSecuritySupply Chain