Security Current

Security Current securitycurrent features security news, data, analysis, practical advice, discussion and research. For more information visit www.securitycurrent.com

About Security Current

Security Current improves the way security, privacy and risk executives around the world collaborate to protect their organizations and their information. Its CISO-driven proprietary content and events provide insight, actionable advice and analysis giving executives the latest information to make knowledgeable decisions. www.securitycurrent.com

Its key contributors inclu

de Hearst’s David Hahn, Miami International Holdings’ John J. Masserini, Elsevier’s David Cass, BBDO’s David Sheidlower, Molson Coors’ Christine Vanderpool, LCRA’s Larry Whiteside Jr., Corning Credit Union’s, Mike Saurbaugh, Virginia Tech’s Randy Marchany, and lawyer and security & privacy expert Mark Rasch.

Listen to our latest podcast with FirstBank's Greg Schafferhttp://traffic.libsyn.com/insight/Schaffer-EncryptionMP3.mp3
01/29/2016

Listen to our latest podcast with FirstBank's Greg Schaffer

http://traffic.libsyn.com/insight/Schaffer-EncryptionMP3.mp3

Encryption is fundamental to business today. But encryption also allows evildoers to plan nefarious criminal or terrorist acts.  Law enforcement, intelligence agencies and political interests have proposed "back doors" to enable them to do their jobs.  Shades of the cryptographic device, T…

Informative and entertaining piece on the future of the password with leading security executives weighing in:Chris Bull...
01/29/2016

Informative and entertaining piece on the future of the password with leading security executives weighing in:

Chris Bullock, Aaron’s, Inc. CISO
"Passwords are about as sexy as locking the front door of your house before you leave for work however, that being said, both are still a rudimentary and necessary instrument of security.

"Just like the locks on our front doors can’t stop a determined burglar or home invader 100% of the time, we continue to invest in door locks and alarms to protect our property. Quite similarly, just because thousands of doors continue to be kicked in even when the lock is activated, we don’t decide to stop locking our doors. The lock is simply part of a layered defense model necessary to ensure our safety and secure things of value. Passwords are exactly the same."

Read more CISOs take...
http://bit.ly/1PHyF2k

Ten CISOs from across industries weigh in on the effectiveness of passwords, with most predicting that the days are numbered for the password as the sole authentication method. They see enterprises moving to augment or supplant the traditional password with advanced technologies, such as biometrics.

01/26/2016

Bank of Tokyo-Mitsubishi UFJ, Ltd., VP Enterprise Security Farhaad Nero relays why CISOs should be concerned about moving to the cloud.

"There are many reasons to move to the cloud. And though you may not have much choice in any event -- you’ve done your research, the RFIs, the RFPs, and the POCs -- you are left with the following concerns that make you wonder if you actually could, should and would avoid the cloud:"

Read the 11 reasons here: http://bit.ly/1numg5z

“The horse is here to stay but the automobile is only a novelty – a fad.” Michigan Savings Bank president advising Henry Ford’s lawyer, Horace Rackham, not to invest in Ford Motor Company (1903).

Our March 2016 Security Shark Tank is now full with 26 leading CISOs who will hear from 8 innovative vendors. We'll be h...
01/26/2016

Our March 2016 Security Shark Tank is now full with 26 leading CISOs who will hear from 8 innovative vendors. We'll be highlighting those vendors and CISOs as we approach the event (www.securitysharktank.com)

Check out Security Shark Tank Vendor ProtectWise with its Cloud Network DVR for enterprise security.

http://bit.ly/1TlQ7sB

Watch our sponsor CYREN's on-demand webinar "Exploring Internet Security for Today's Threat Landscape" http://bit.ly/1ZA...
01/20/2016

Watch our sponsor CYREN's on-demand webinar "Exploring Internet Security for Today's Threat Landscape"

http://bit.ly/1ZAiAuG

CISO David Sheidlower:  When big data is analyzed, actions can be taken based on that analysis.  Hence, the Sanders camp...
01/13/2016

CISO David Sheidlower: When big data is analyzed, actions can be taken based on that analysis. Hence, the Sanders campaign data analysts (three others aside from Uretsky appear to have accessed the data), if they were intentionally accessing the Clinton data to learn about the opposing campaign’s strategies or develop new ones of their own, were essentially doing what they were hired to do: run queries against the data and get actionable insights from it.

Read more:
http://www.securitycurrent.com/en/ciso_journal/ac_ciso_journal/the-sanders-clinton-data-brouhaha-it-is-not-about-privacy-and-all-about-identity

In August of 2010, Huping Zhou who had served as a researcher at the UCLA School of Medicine and had since been terminated, was sentenced to jail time for inappropriately looking at the medical records of his immediate supervisor and some notable celebrities including Drew Barrymore, Arnold Schwarze…

Check out the cool emerging companies including User and Entity Behavior Analytics startup Interset that will pitch Secu...
01/13/2016

Check out the cool emerging companies including User and Entity Behavior Analytics startup Interset that will pitch Security Current's leading panel of CISOs during RSA at the www.securitysharktank.com.

Interesting fact: Interset's CEO is a seasoned entrepreneur who founded an IT performance-analytics company that was sold to VMWare.

GE Capital Americas CISO James Beeson will take part in Security Current's Security Shark Tank and advises security star...
01/13/2016

GE Capital Americas CISO James Beeson will take part in Security Current's Security Shark Tank and advises security startups to take 'small steps (MVP approach). Fail fast and cheap. Focus on SMBs rather than engaging with big companies first. They are in desperate need of your help and won’t completely takeover your strategy and approach.'

01/07/2016

"Security Current did a great job of throwing us into the Security Shark Tank and we were pleased to find some very sharp, straight talking forward thinking Sharks. We survived the tank with a number of lasting profitable business relationships and were given top overall solution in the competition against five other vendors. I would recommend the venue to all innovative companies with disruptive security solutions looking to meet today's top security executives." SentinelOne SVP of Sales Robert Cariddi

http://www.securitysharktank.com

Innovating as a CISO: Changing the ConversationBy Devon Bryan ADP VP of Global Technical Security Services
01/07/2016

Innovating as a CISO: Changing the Conversation
By Devon Bryan
ADP VP of Global Technical Security Services

I recently sat on a panel with fellow security executives to discuss the general topic of innovating as a CISO. Unsurprising and somewhat understandable, the conversation quickly devolved and topics covered included RSA’s Innovation Sandbox, the large number of startups CISOs visit at RSA each year…

Push Beyond Political Rhetoric in the Backdoor Encryption Debate- Greg Schaffer, FirstBank VP & ISO
01/06/2016

Push Beyond Political Rhetoric in the Backdoor Encryption Debate
- Greg Schaffer, FirstBank VP & ISO

The old year is over, the new one has begun, and that means information security predictions galore! From my very unscientific perusal of many of those, incident response, cyber insurance, information sharing, and vendor management top the lists of high importance target areas for 2016. All of these…

01/05/2016

According to Jason Witty, Exec VP & US Bancorp, there are five major sources of threats and they are continuing to evolve dramatically. Listen Now.

Three Things to Consider in 2016By John J. Masserini, MIAX Options CSO
01/04/2016

Three Things to Consider in 2016
By John J. Masserini, MIAX Options CSO

So it seems that many a security pundit has decided to put their 2016 predictions out there for the world to ponder. Depending on who you believe, the next 12 months will be filled with catastrophic infrastructure failures, massive financial breaches or the disclosure of millions of health care reco…

01/01/2016

Happy New Year. Wishing everyone a safe and secure 2016!

In a new survey, 25 CISOs largely blamed the "year of breaches" on poor security foundations, and identified the major t...
12/31/2015

In a new survey, 25 CISOs largely blamed the "year of breaches" on poor security foundations, and identified the major threats of the new year.

In a new survey, 25 CISOs largely blamed the "year of breaches" on poor security foundations, and identified the major threats of the new year

12/29/2015

Each year is a new opportunity to use what we've learned in the past in order to address the future and anticipate what the bad actors may do next to breach our .
Listen Now:

25 CISOs Identify the Biggest Security Challenges as They Enter 2016
12/29/2015

25 CISOs Identify the Biggest Security Challenges as They Enter 2016

TENAFLY, N.J., Dec. 29, 2015 /PRNewswire/ -- Security Current, an information and collaboration company by CISOs...

12/28/2015

In this four-part series Brian Lozada examines the state of in our nation’s critical infrastructure, what is at risk, what makes it unique and what measures can be taken to bolster its safeguards.

In this four-part series CISO Brian Lozada examines the state of cybersecurity in our nation’s critical infrastructure, what is at risk, what makes it unique and what measures can be taken to bolster its safeguards.

  Buying Trends Approaches and Considerations- Vic Wheatman
12/27/2015

Buying Trends Approaches and Considerations
- Vic Wheatman

With the plethora of information security products and services on the market, how can CISOs prioritize what they truly need? And how can they differentiate from what may be a short-term fad brought to market by earnest but oftentimes aggressive solution providers or a long-term solution? …

‘Tis the Season for Cybercriminals - Part Two - By Anthony Scarola, TowneBank CISO
12/26/2015

‘Tis the Season for Cybercriminals - Part Two - By Anthony Scarola, TowneBank CISO

In this two-part series, CISO Anthony Scarola examines the elevated threats for both shoppers and financial institutions during the holiday season and offers best practices for ensuring your enterprise is protected during the time of increased risk. Read Part One here.

U.S. Bancorp's CISO Discusses the Growing Cybersecurity Threat in 2016 - Security Current's Vic Wheatman Speaks with .S....
12/23/2015

U.S. Bancorp's CISO Discusses the Growing Cybersecurity Threat in 2016 - Security Current's Vic Wheatman Speaks with .S. Bancorp Jason Witty

The overall cost of cyber crime in 2015 to the world economy as a whole was estimated at a conservative $575 billion, according to research. Breaches are growing in number and sophistication. According to Jason Witty, Executive Vice President and CISO at U.S. Bancorp, there are five major sources of…

Security Current CISO 2016 Forecast SpotlightWayne Proctor SVP, CISO FLEETCOR Technologies"The most important focus for ...
12/21/2015

Security Current CISO 2016 Forecast Spotlight
Wayne Proctor SVP, CISO FLEETCOR Technologies

"The most important focus for cyber security in 2015 has been improving incident response capability. The wave of recent major data breaches makes it clear that if your company is targeted by hackers, you will be breached. This reality required a move from focusing on prevention strategies to become experts at incident response.

Companies not only need to have solid incident response plans but also need to gain deep visibility in to what is happening inside their IT environment, as you can’t respond to something you don’t know about.

Enhancing security visibility will be the primary driver for security spend in 2016. Primary solutions to help enhance visibility include: advanced threat identification, next generation SIEM, threat feeds and data analytics."

Read More http://www.securitycurrent.com/en/ciso_journal/ac_ciso_journal/cisos-identify-the-biggest-security-challenges-as-they-enter-the-new-year

Big thanks to ForeScout for sponsoring our CISO Roundtable discussion and to our gracious host, Barnabas Health.Some com...
12/21/2015

Big thanks to ForeScout for sponsoring our CISO Roundtable discussion and to our gracious host, Barnabas Health.
Some comments from the event:
"The richness of the content and awesome peer interactions made for a truly awesome event!" "I liked the topics and level of participation from everyone. I’m looking forward to the next one." "Very lively conversations on the interesting topics – I am sure we could have gone all day with the conversations."

ForeScout is the World's Leading Provider of NAC & network security management tools. Easy to deploy, easy to manage. Contact us for a Free Demo!

Some creative fun from CyberPoint for opening night,  . "Grand Moff Tarkin should've listened to his  "
12/17/2015

Some creative fun from CyberPoint for opening night, . "Grand Moff Tarkin should've listened to his "

It is a period of cyber war. In an effort to sustain commerce during these challenging times, the Galactic Trade Federation has required the Empire retain the services…

Address

Tenafly, NJ

Alerts

Be the first to know and let us send you an email when Security Current posts news and promotions. Your email address will not be used for any other purpose, and you can unsubscribe at any time.

Contact The Business

Send a message to Security Current:

Videos

Share


Other Tenafly travel agencies

Show All