CISO Dashboard: improve data governance with visibility to all content entering and leaving your organization; demonstrate compliance with one-click reports
” upset me. It appears that the most popular means of justification are scare tactics — cybersecurity breach reports and evaluations of damages done to the company by past attacks. Yes, that works — the first time, and maybe the second. But when the third time comes around, the answer...
Cooperation and Information Exchange: To foster collaboration and shared knowledge, organizations must engage with the Cooperation Group, CSIRTs network, CyCLONe, CVD, and European vulnerability database, participate in peer reviews, and contribute to the biennial ENISA cybersecurity reports. Organizations...
Challenge: Convince the PCI Standards Council to send a sternly worded letter to Oracle ordering them to apologize for this post and explicitly grant permission for vulnerability reports, on penalty of the PCI industry adding a notice to their compliance documents which explicitly forbids (or at le...