01.06.2020 Views

Cyber Defense eMagazine June 2020 Edition

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

Cyber Defense eMagazine June Edition for 2020 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group as well as Yan Ross, US Editor-in-Chief, Pieruligi Paganini, Co-founder & International Editor-in-Chief, Stevin Miliefsky, President and many more writers, partners and supporters who make this an awesome publication! Thank you all and to our readers! OSINT ROCKS! #CDM #CDMG #OSINT #CYBERSECURITY #INFOSEC #BEST #PRACTICES #TIPS #TECHNIQUES

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Introducing the Role of The Chief <strong>Cyber</strong>crime Officer<br />

Can the CISO and CCO work in harmony?<br />

By Matt Cable, VP Solutions Architects & MD Europe, Certes Networks<br />

The TalkTalk data breach in 2015 had big repercussions. With the personal details of 157,000 customers<br />

accessed, including bank account numbers and sort codes of over 15,000 customers, it certainly was not<br />

the largest the industry had seen. However, it resulted in government recommendations that a specific<br />

officer should be appointed with day-to-day responsibility for protecting computer systems from cyber<br />

attack.<br />

In most organizations, this responsibility fell to the Chief Information Security Officer (CISO), supported<br />

by the CEO, with the main task of strengthening the organization’s cyber security capabilities. While the<br />

role of the CISO is certainly not new, it has evolved over recent years to keep up with the advancements<br />

in the threat landscape. A CISO’s job description is now extremely varied, including managing security<br />

operations, cyber risk and cyber intelligence, security architecture, data loss and fraud prevention,<br />

program management, identity and access management and compliance and governance.<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> –<strong>June</strong> <strong>2020</strong> <strong>Edition</strong> 103<br />

Copyright © <strong>2020</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!