In today's digital environment, protecting sensitive information and sales transaction data is of critical importance. Technology and advanced loyalty programs are driving the collection of additional data, causing consumers to pay more attention to the types of data they are willing to share with merchants.
In...
Target. Home Depot. Starwood. These retail and hospitality giants have been among the top data breach headlines in recent years. And in response, the industry formed the Retail and Hospitality Information Sharing and Analysis Center to be a central hub for sharing sector-specific cyber security information and...
Tremendous technology changes in recent years have made exponential leaps in the way we will communicate, interact and transact with each other. The Internet of Things has brought about the potential for embedded low cost sensors on everything around us, on us and even in us. Blockchains and smart contracts with...
The CERT Insider Threat Center at Carnegie Mellon University is one of the world's leading authorities on detecting insider fraud, and it has just released Version 6 of its Best Practices to Mitigating Insider Threats.
As part of this research, the center addresses how to detect and prevent insider fraud, as well as...
In this session, Todd Carroll, former FBI Special Agent, will draw from his experience with the FBI and from his current role as CISO with Cybelangel to discuss:
Case studies showing exposure of sensitive data by trusted partners in airport operations
The increased risk of connected storage and exposure of data...
Fifty-four percent of survey respondents say their institutions' digital authentication measures are average or below when compared to their peers. And 55 percent rate themselves at average or below when it comes to their institution's current ability to apply the right amount of security to the right transactions at...
U.S. organizations were barely GDPR compliant in 2018, when California unveiled its own privacy legislation, the California Consumer Privacy Act, which goes into effect on Jan. 1, 2020. Yet, this is but one of several privacy laws being enacted across the U.S., and it poses many questions about the role of security to...
Cybercrime has targeted bank and payments solutions for a long time, but in the past few years has expanded its target industries to airlines, insurance, travel, retail and others. CISOs and fraud leaders that have been focused on insider threats are finding they need to consider the fraud darknet eco-system and...
Stories, practical experiences, anecdotes and a bit of humor about creating and managing cloud security programs and the journey to devsecops. This will be an interactive session.
The session will cover:
Key components of cloud security programs and the basics of devsecops
Real world challenges and practical...
The bad guys are winning the war on identity-theft, with losses mounting for organizations across sectors. Increasingly organized criminals have plenty of weapons in their arsenal, including vast quantities of breached data and carefully cultivated synthetic identities. What are the top trends shaping the rising tide...
Application Security can't continue to be the responsibility of just security experts anymore. After all, anyone can code! And while there are certainly best practices, there is no one-size-fits all. A reasonably designed and executed program should make everyone's job easier.
Join this session for first-hand insight...
There's a lot of talk about the malicious insider, but not as much about the unintentional insider. Whether its employees using personal software to simply get the job done or teams selecting and expensing unauthorized software, company information assets are increasingly difficult to manage. The cloud has brought...
With the extensive network systems found in the health care industry, SSH keys are widely used to provide privileged administrative access and to secure machine-to-machine automation for important business functions. However, SSH keys are routinely untracked, unmanaged and unmonitored. This lack of visibility and...
Data in non-production environments occupy a significant percentage of total enterprise data volume--often as much as 80%. Non-production environments also carry more risk than production because there are more direct users. Data security regulations such as GDPR, CCPA, NY DFS etc., do not distinguish between...
From blockchains and surveillance to backdoors and GDPR, a group of leading cryptographers rounded up the top cybersecurity and privacy matters of the day at the cryptographers' panel held at the recent RSA Conference 2019 in San Francisco.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.