By Topic
By Industry
By Product Category
By Features
By Technology
By Services
By Audience
By Language
Displaying 571 - 600 of 621
Security Roundtable Article
CSO Roundtable: RSA 2017 Takeaways
Palo Alto Networks Chief Security Officer, Rick Howard, leads a roundtable discussion with colleagues Ryan Gills, Vice President …
Security Roundtable Article
The Cybersecurity Canon: Navigating the Digital Age: The Definitive Cybersecurity Guide for Directors and Officers
We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books. We …
Rick Howard,
Security Roundtable Article
Heading to Davos: Responsible Leadership Preserves Trust in the Digital Age
Next week, I will have the privilege of participating in the annual meeting of the World Economic Forum …
Mark McLaughlin,
Security Roundtable Article
日本のサイバーセキュリティ経営ガイドライン
2015年5月、サイバー攻撃によって日本年金機構から125万件もの個人情報が流出してしまいました。この事件は、1ヵ月後の米国での連邦人事管理局(OPM)へのハッキング事案と同様、日本で注目を集めました。近年情報流出が続く中、この日本年金機構の事件は日本を震撼させ、経営者層の意識を高めるとともに、日本のサイバーセキュリティ態勢に大きな影響を与えています。 7ヵ月後となる2015年12月、経済産業省及び独立行政法人 情報処理推進機構(IPA)は、「サイバーセキュリティ経営ガイドライン Ver 1.0」を発表しました。この36ページに及ぶ文書は、経営者層向けに専門用語を廃し、平易な日本語で書かれています。同ガイドラインでは、積極的にセキュリティ対策を推進する経営幹部のいる割合がグローバルでは59パーセントであるのに対し、日本ではわずか27パーセントにとどまるというPwCの調査結果 が引用されています。この結果に経済産業省及びIPAは衝撃を受けました。 このガイドラインの発表後、産業界の関心は高まりました。日本の経営者層は、自社のサイバーセキュリティ対策の方向性を学ぼうとしています。ガイドラインに関するセミナーは東京をはじめとする大都市で盛況です。従来であれば、サイバーセキュリティ系のイベントに主に参加するのは技術者だったのとは対照的に、マネジメント層や経営者層も足を運ぶようになってきています。また、日本のキープレイヤーたちもこうした動きに呼応しています。2016年1月に経団連は「サイバーセキュリティ対策の強化に向けた第二次提言」を発表し、経営者層の意識向上を促すとともに、サイバーセキュリティの確保を「経営上のリスク管理の重要項目」と位置づけています。 経団連が先鞭を付けた後、今年4月には富士通株式会社がグループ全体に適用するグローバルな「富士通グループ情報セキュリティ基本方針」を策定・発表しました。日本企業は文化的に足並みをそろえることを好むため、他企業も今後続々とポリシーの策定をするものと思われます。 では、日本人以外の読者にとって、本文書はどのような意味を持つのでしょうか? 日本政府は、ガイドラインの概要の中で、サイバーセキュリティは経営問題であり、知財など企業価値を守るためIT及びセキュリティに対する投資を経営判断としてすべきであるとうたっています。合わせて、経営者が認識する必要のある3原則及び情報セキュリティ対策を実施する上でのトップとなる最高情報セキュリティ責任者(CISO)に指示すべき重要10項目について説明が加えられています。 3原則とは、下記のとおりです。 経営者がリーダーシップをとって、経営に対して受容できるリスクのレベルを勘案し、サイバーセキュリティに投資する 情報漏えいリスクの軽減のために、自社のみならず、系列企業及びビジネスパートナーのセキュリティ対策も策定する サイバーセキュリティ対策について関係者に説明し、コミュニケーションをとり、信頼を構築する 重要10項目は、より具体的にとるべき手段について説明してあり、経営者とセキュリティ担当者との橋渡し役になることを求めています。経営者層がCISOに指示すべき項目は、下記のとおりです。 セキュリティポリシーの策定 適切な管理体制の構築と責任の明確化 守るべき資産の特定、セキュリティリスクの洗い出し及びリスクへの対処計画の策定 …
Security Roundtable Article
Poland Expands Leadership Role on Cybersecurity
At the end of September, I had the opportunity to attend the second annual CYBERSEC EU conference in …
Danielle Kriz,
Security Roundtable Article
Executive Advisory Report: Credential Theft
Credential theft is the oxygen of malicious activity: nearly always there, necessary, but never noticed. According to the 2016 Verizon® Data Breach Report, 63 percent of confirmed data breaches leveraged credentials, and the use of stolen credentials is the most common approach in web-app attacks. Credential theft is a staple in the playbooks of sophisticated attackers, like the Sofacy threat actor group, and unsophisticated attackers alike.
Unit 42,
Security Roundtable Article
Winning The Game Against Cyber Criminals
Employees are fast becoming the weakest link in the defense against cybercriminals. Sometimes common sense can only go …
Sean Duca,
Security Roundtable Article
What Target Is Teaching Shareholders About Breaches
Target’s high-profile data breach made headlines worldwide. Despite this, neither Target’s 2014 proxy statement nor the company’s initial …
Martha Carter,
Security Roundtable Article
It’s Time To Get Serious About Securing the Internet of Things
In the time it takes you to read this sentence-about eight second-approximately 150 new devices will have been …
Security Roundtable Staff,
Security Roundtable Article
5 Strategic Tips for Purchasing Cybersecurity Insurance
Cybersecurity insurance coverage can be extremely valuable, but choosing the right insurance product presents significant challenges. A diverse …
Roberta D. Anderson,
Security Roundtable Article
How Effective Boards Drive Security Mandates
A recent survey report of 381 board directors by NYSE Governance Services, in partnership with Diligent, found that 92% …
Security Roundtable Staff,
Security Roundtable Article
What Do Cyber Insurance Underwriters Really Care About?
Get your copy of Navigating the Digital Age here.
Ben Beeson,
Security Roundtable Article
Understanding Cyber Readiness and M&A
Get your copy of Navigating the Digital Age here.
Jennifer Archie,
Security Roundtable Article
How We Adapt to Prevent Highly Automated Cyber Attacks
Get your copy of Navigating the Digital Age here.
Mark McLaughlin,
Security Roundtable Article
For the Board, Focus Should Be On ‘Cyber Resilience’
Cybersecurity has taken its place among the catalog of enterprise risks that demand long-term boardroom attention. It is …
Erin Nealy Cox,
Security Roundtable Article
The Yahoo Lesson for CEOs: Bring your CISO into the Boardroom
If you view your CISO as a techno-nerd, capably managed by the CIO and therefore someone the board …
Security Roundtable Staff,
Security Roundtable Article
5 Problems That Keep CISOs Awake at Night
The last few years have shown a big difference in the way cyber-risks are acknowledged, but progress still …
Security Roundtable Staff,
Security Roundtable Article
FICO-Like Cybersecurity Scores Are Imminent: What Do They Mean For Your Business?
We are a culture of “likes,” numbers and ratings. In today’s age, we have easy access to any …
Security Roundtable Article
What To Expect and Consider When Hiring A CISO
The market for top-tier CISOs is now highly competitive. Information cybersecurity has become a high-profile corporate concern, and …
Kal Bittianda,
Security Roundtable Article
The 5 Questions Every CEO Should Ask a Technical Security Team
As the CEO of an organization, it is your job to balance risk and reward within your company. …
Davis Hake,
Security Roundtable Article
Checklist: Assessing Third Party Cybersecurity Risk
Businesses increasingly work with third parties in ways that can render otherwise well-guarded data vulnerable to attack or …
David N. Fagan,
Security Roundtable Article
The Security Risk Lurking in the Board of Directors
An enterprise’s board of directors is there to steer the business. However, in some cases, it is wearing …
Security Roundtable Article
Communicate Effectively Among Your Cybersecurity Stakeholders
Effective communication, especially during a time of change, requires frequent touchpoints. Having a communicator or a communication team …
Rich Baich,
Security Roundtable Article
Cybersecurity Requires a New Risk Equation
Get your copy of Navigating the Digital Age here.
Scott Kannry, David W. White,
Security Roundtable Article
Bipartisan Group of Lawmakers Backs New Election Security Bill
A bipartisan coalition of Senate lawmakers introduced legislation on Thursday meant to strengthen U.S. election cybersecurity following Russian …
Security Roundtable Article
Preparing for New EU Data Protection Regulations
Get your copy of Navigating the Digital Age here.
Greg Day,
Security Roundtable Article
Cybersecurity: No Longer Just a Boardroom or Server Room Issue
Get your copy of Navigating the Digital Age here.
Gus Coldebella,
Security Roundtable Article
‘Data Privacy Day’ Significant in Our Hyper-Connected World
This Sunday, January 28, 2018, will mark the 10th annual observance of Data Privacy Day, which commemorates the …
Stephanie Overby,
Security Roundtable Article
Today’s Investor Relations Must Jump Into the Breach
If a little knowledge is a dangerous thing, when it comes to cybersecurity, any knowledge is subject to …
Mercedes Cardona,
Security Roundtable Article
Palo Alto Networks CMO René Bonvanie on Crisis Management
Security Roundtable’s editor in chief, Tim Moran, recently sat down with René Bonvanie, chief marketing officer at Palo …
Tim Moran,
Displaying 571 - 600 of 621