For Santosh Kamane, head cybersecurity, risk management and business continuity at DBS Asia Hub 2, privacy regulations play a huge role in improving the security posture of enterprises, including banks.
In the U.S., three states now have disparate data privacy laws - and more are coming. Meanwhile, China has enacted a new law that has global enterprises scrambling. How will these and other actions shape privacy discussions in 2022? Noted attorney Lisa Sotto shares insights.
On the cusp of 2022, John Kindervag - the father of the Zero Trust security model - reflects on how the Zero Trust dialogue has evolved in 2021 and makes his New Year's predictions. Will the president's executive order be an accelerator or an anchor? Which myths are ripe to be busted?
As ransomware attacks continue to pose a significant threat to enterprises and individuals, "We will keep banging the message that basic cyber hygiene makes a big difference to lots of people," says Andy Bates of the Global Cyber Alliance. He also discusses the alliance's top priorities for 2022.
Organizations lack a basic understanding of "the landscape of security vulnerabilities," says U.K.-based cybersecurity expert John Walker. He discusses the state of cybersecurity today - including why he prefers the term "verified trust" to Zero Trust - and offers predictions for 2022.
Where the fraud market is headed in 2022, and which fraud prevention strategies will give enterprises the most bang for their buck? Three experts - Featurespace's PJ Rohall, Accenture's Sophia Carlton, and American Bankers Association's Ian Mitchell - detail what to expect next.
Lisa Sotto, partner and chair of the global privacy and cybersecurity practice at Hunton Andrews Kurth LLP, joins three ISMG editors to discuss important cybersecurity and privacy issues, including how U.S. enterprises are harmonizing three disparate privacy laws, and ransomware preparedness.
What does the C-suite want to know about ransomware preparedness and response strategies? CEO of (ISC)² Clar Rosso shares findings from the company's new report that provides insights into the minds of C-suite executives and how they perceive their organizations’ readiness for ransomware attacks.
Three experts - Indrani Chandrasegaran, managing director, Accenture Security; Carrine Teoh Chooi Shi, CSO, Bond Holdings; and Estelle Wang, team lead for Singapore Security & Privacy Competence Center, Continental share their thoughts on data governance with ISMG.
CISOs need to harden the algorithms written for artificial intelligence, as cybercriminals always leverage AI to launch a zero-day vulnerability, says Manojkumar Parmar, technical global program director at Bosch.
The newly published U.K. Cyber Security Strategy demonstrates "the depth of ambition that the U.K. has got for the cyber sector," says Dan Patefield, program head of cyber and national security at techUK. He discusses the opportunities and challenges the new strategy brings.
The Log4j vulnerability has underscored once again the widespread dependence on open-source software projects and the lurking risks. Patrick Dwyer of OWASP says such projects deserve more resources to avoid major security vulnerabilities.
Garry Hargreaves, director of the NATO Communications and Information - or NCI - Academy, discusses the institution's mission to train and educate NATO’s cyber workforce by creating an "enduring NATO cyberspace curriculum."
Banks need to build a good risk posture mechanism rather than continue with traditional handling mechanisms, says Vaibhav Khandelwal, head of security and fraud for Asia-Pacific, China and Japan at F5.
For Raina Verma, head of fraud and forensics at Majid Al Futtaim, Retail, a holding company in Dubai that manages hotels and retail chains, data continues to be an important tool to uncover insider fraud. She discusses how to include contract employees in fraud strategy and offers tips on leveraging data.