Under the EU's General Data Protection Regulation, within 72 hours of an organization learning about the data breach, it must report the breach to relevant authorities or face fines. The U.K.'s data privacy watchdog says it's already seen the volume of self-reported breaches quadruple.
Randy Trzeciak, director of the CERT Insider Threat Center at CMU, says he's frequently asked: "Haven't we solved the insider threat problem?" Far from it, he responds. In fact, he's helping many organizations start insider threat defense programs. He'll be a speaker at ISMG's New York Security Summit.
For years, Brett Johnson dedicated his time to cooking up new ways to defraud individuals and enterprises. Now the convicted felon spends his time recounting his crime story for business and security leaders. He'll be a featured speaker at ISMG's Security Summit Aug. 14-15 in New York.
Jon Montroll, the former operator of a bitcoin exchange that was hacked, leading to the theft of 6,000 bitcoins, has pleaded guilty to charges that he obstructed federal investigators and deceived investors by attempting to cover up the losses.
"Our risk landscape has changed from protecting the things that we operate to protecting the things that we buy, and that's why third party risk management is the place where people are really focusing," says Joel de la Garza of the venture capital firm Andreessen Horowitz.
Alberto Yepez of ForgePoint Capital says cryptocurrency poses new challenges for accommodating the "know your customer" process of confirming that you're "doing business with the people that you want to be doing business with."
With the topic of election security buzzing, Elvis Chan of the FBI has two primary concerns about the upcoming midterm elections: The cybersecurity of the election systems and protecting people from the influence of foreign adversaries such as Russia.
Barely one month after the enforcement date of the EU's General Data Protection Regulation, California passed its own landmark new data privacy legislation. Cisco Chief Privacy Officer Michelle Dennedy discusses this new law and what it says about the business value of data privacy.
In the wake of so many mega-breaches, new account fraud is easier to perpetrate than account takeovers. This puts new pressure on enterprises to know their digital customers, as well as to authenticate their identities and activities, says Shaked Vax of IBM Security.
Breach defense is a strategic business issue for most enterprises, but too many cybersecurity solutions rely more on flash than substance, says Lastline CEO Chris Kruegel. It's time to start talking about true breach defense.
Medical testing laboratory firm LabCorp is still working to fully recover systems functionality nearly a week after a cyberattack that the company now claims involved "a new variant" of ransomware. What can other organizations do to avoid becoming the next victim?
Singapore's largest healthcare group has suffered a hack attack that exposed 1.5 million residents' personal details. But authorities say the "deliberate, targeted and well-planned attack" appears to have been principally designed to steal medical information pertaining to the country's prime minister.
Despite having the Information Technology Act, which covers aspects of privacy, India needs a separate privacy law along the lines of the EU's General Data Protection Act, argues cyber lawyer Vaishali Bhagwat.