|
|
|
|
Baltimore’s bridge response carries a powerful message for local government
Christopher Jablonski, Director, CXO REvolutionaries & Community, Zscaler
The response to Baltimore’s Francis Scott Key Bridge collapse is another prime example of America's fortitude in the face of tragedy. The Key Bridge Response 2024 Unified Command and Washington are pulling resources to restore commerce in and out of Baltimore as quickly as possible after recovering and honoring the lives lost. President Biden's
Fact Sheet details an exhaustive list of actions to aid in recovery and prevention.
The SLED sector can draw inspiration from the cross-government collaboration and coordination on display in Maryland to create more positive change.
We all know proactive steps to secure critical infrastructure reliant on information technology can help avoid potentially costly and incidents down the road. Consider Water and Wastewater and K-12. The DHS-CSA designates these sectors as critical infrastructure. The White House, EPA, and Department of Education are putting pressure on these organizations to address their vulnerabilities and strengthen cyber defenses. CISA has
new incident reporting requirements planned by year's end.
State leaders like
J.R. Sloan, CIO of the State of Arizona, and
Michael Toland, CISO of Management and Enterprise Services for Oklahoma, and
David Cagigal, former CIO State of Wisconsin are at the forefront of the challenges described above and opportunities facing SLED. We recently invited them to a
virtual panel where they outlined the collaboration and technology modernization needed to stay ahead and live up to the ounce-of-prevention proverb.
|
|
|
|
From the Office of the CISO:
Unveiling the dark arts of exploiting trust
Tony Fergusson, CISO in Residence, Zscaler
Trust is a fundamental aspect of human interaction, forming the foundation of relationships and societal harmony. However, trust can also be deceptive, concealing hidden vulnerabilities that emerge when we let our guard down. This leaves us exposed to unforeseen risks and challenges.
There was a time when internet security was essentially synonymous with URL filtering. This recognized site = allow. This known bad website = block. These black-and-white distinctions served us well when the internet was more static. Today, trust isn’t so simple.
Content delivery networks (CDNs) and SaaS offerings have expanded our exposure to dangerous traffic from trusted web domains. As a result, malware is losing popularity among cybercriminals in favor of stealthier attack methods.
Why today’s cybercriminals are turning to living off of trusted sites.
|
|
|
|
|
Join the CXO Experience at Zenith Live, an exclusive, executive-tailored engagement where you can exchange best practices, validate strategies, connect with fellow C-level leaders, and unwind in our private executive lounge. Get the executive-level insights and knowledge you need to effectively transform your network, security, and applications in a world increasingly defined by AI, cloud, mobile, risk, and disruption.
Las Vegas, Nevada, US | June 10-13
The Hague, Netherlands
| June 17-20
|
I recently read an article reporting a new, generative AI worm dubbed “Morris II” and I immediately began to worry. Would AI learn the best ways to phish me? Could AI predict where my vulnerable systems and users are? Would it easily find new and previously unreported vulnerabilities by which to compromise me? Would all of this happen at quantum speed?
Learning to stop worrying and embrace AI
|
Ah, the brave new world of AI. From self-driving cars to stock market predictions, it seems artificial intelligence is infiltrating every corner of our lives. But hold onto your hats, folks, because the convergence of AI and OT may take this ride to a whole new level of complexity (and potential disaster, if we're not careful).
A CISO’s keys to safely integrating AI and OT
|
ChatGPT, GitHub Copilot, and Jasper are just a few examples of an explosion of AI tools shaping the next frontier of productivity in many organizations. Executives are pushing their teams to adopt these tools in the name of innovation and productivity, but only some are taking the risks they can pose seriously.
Exploring AI’s promise for data loss prevention
|
Could you accurately and succinctly describe zero trust to your leadership team or board? During my five years as a VP analyst at Gartner, I witnessed executives struggle to convey the concept in business language, and it’s not entirely their fault; “Zero trust” rolls out the red carpet for misinterpretation and misrepresentation.
Conveying the value of zero trust for the business
|
|
|
|
|
|
Podcast Center
Tune in and zone out to stories of digital business and cybersecurity excellence from across our CXO community.
|
|
The CIO Evolution | Ep. 32
Infrastructure modernization efforts don’t always need a top-down mandate to succeed or get off the ground. Some initiatives start in the middle and work up and down the hierarchy, building support. That is often the case for architectures based on zero trust, given the transformational impact it can have across several departments and use cases. In this panel, learn how two executive leaders commenced initiatives where security wasn’t the impetus.
Listen now
|
The CISO’s Gambit | Ep. 34
Darin Hurd, EVP and CISO at Guaranteed Rate, explains the value of zero trust security in the financial sector. Lenders cannot control the federal funds interest rate or the state of the economy, which can change rapidly. However, they must respond and adapt to these variables and others while ensuring their infrastructure remains secure. Darin explains how grit, partnerships, and clear communication are key factors in bringing zero trust to financial organizations.
Listen now
|
Cloudy with a Chance of Trust | Ep. 50
From missiles to your money, Regions Bank Sr. VP of Cybersecurity Engineering Jay Patty has more than 20 years of cybersecurity experience protecting some of society’s most important assets. In this episode, he recalls his career trajectory and some of the personal traits that keep him seeking cyber’s toughest challenges, from the U.S. Missile Defense Agency to the banking sector.
Listen now
|
|
|
|
|
|
|
|
|