ISSA Journal March 2018
I principali articoli dell'edizione di Marzo 2018, riservata ai Soci AIPSI-ISSA:
- Security in Mergers and Acquisitions, by Miriam T. Levenstein - ISSA member, Capitol of Texas Chapter. Mergers and acquisitions are powerful drivers of business growth but bring a multitude of risks, including cybersecurity risk. This article will provide guidance on how to improve security governance.
- The Basics of Privileged Access Management, by Michael Rogers - ISSA member, Minnesota Chapter. This article demonstrates how poorly managed administrative credentials are used by hackers to compromise networks and result in ransomware, data breaches, and other attacks. Several common and proven techniques for protecting your network are discussed.
- Baking an IT Risk Program from Scratch, by Steve Horstman - ISSA member, Fort Worth Chapter. This article serves as a guide for the lucky person charged with developing a technology risk or cybersecurity program in an organization that previously had no such function.
- Orchestrating the Responses Between Information Security and Privacy During a Data Breach, by David R. Jackson - ISSA member, National Capital (Washington, DC) Chapter. This article explores how to integrate the breach responses between the information security and privacy teams that an organization needs to manage.
- Dilemmas of a Security Architect: How to Protect Critical Systems without Disrupting Continuity of Their Services, by Mariusz Stawowski - ISSA Senior member, Poland Chapter. Security architects face a big challenge to ensure compliance with EU cybersecurity laws and protect critical systems at the right level without disrupting their service continuity. This article explains good practices that should be considered by security architects and other specialists conducting security projects of critical systems.
Le colonne del mese
- From the President
- Recognizing Excellence in Our Membership
- Sabett's Brief
- LAWSEC: Risk Balancing for Companies
- Herding Cats
- Blocking and Patching
- Perspective: Women in Security SIG
- Core Drivers of Cyber Change
- Security in the News
- Crypto Corner
- Cracking 128-bit Keys
- Association News
- Cryptography Pioneers Inducted into National Inventors Hall of Fame
- CISO Executive Forum
- Thought Leadership Series: Security Awareness Strategies
- International Series: Blockchain & Other Mythical Technology
- Book Review
- Listening In, Cybersecurity in an Insecure Age