Tag Risk Management

Live Webinar | Rebuilding Resilience: Accelerating Your Minimum Viable Company in Times of Crisis

Thank You for Joining ISMG Complete your profile to receive the latest updates. Select Title LevelAnalytics/Architecture/EngineeringAttorney / General Counsel / CounselAVPBoard of DirectorC-Level ExecutiveC-Level – OtherChief Commercial OfficerChief Executive Officer / PresidentChief Financial OfficerChairpersonChief Information OfficerChief Information Security Officer / Chief Security OfficerCISO/CSO/CIOChief Operating OfficerChief Risk OfficerChief Technology OfficerDirectorExecutive Vice…

Read MoreLive Webinar | Rebuilding Resilience: Accelerating Your Minimum Viable Company in Times of Crisis

Chinese Espionage Group Aiming at Legacy Ivanti VPN Devices

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime, Governance & Risk Management New Evidence Emerges of Chinese Cyber Operations Targeting Ivanti Products Jayant Chakravarti (@JayJay_Tech) • April 4, 2025 Image: Shutterstock A recent investigation has revealed that a suspected cyberespionage group from China has been targeting Ivanti’s VPN appliances, installing…

Read MoreChinese Espionage Group Aiming at Legacy Ivanti VPN Devices

Cyber Threats Propel CISOs to Ride the Wave of AI Excitement

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Gartner Highlights How Hype Can Propel Organizations Forward Brian Pereira (creed_digital) • March 25, 2025 Deepti Gopal and Dennis Xu from Gartner at the Gartner Security and Risk Management Summit in Mumbai Despite significant investments in artificial intelligence (AI), many…

Read MoreCyber Threats Propel CISOs to Ride the Wave of AI Excitement

The Importance of a Chief Information Security Officer (CISO) in Today’s Corporate Landscape

In an era defined by rapid technological advancements, the role of the Chief Information Security Officer (CISO) has become increasingly vital in ensuring the security and stability of organizations globally. As cyber threats evolve and data breaches become more prevalent, the significance of cybersecurity leadership cannot be understated. The CISO…

Read MoreThe Importance of a Chief Information Security Officer (CISO) in Today’s Corporate Landscape

Security by Design: A Imperative for Software Development

Application Security, Events, Governance & Risk Management Schneider Electric’s Crossley Calls for Enhanced Supplier Evaluation and Ongoing Risk Assessment Geetha Nandikotkur (AsiaSecEditor) • March 24, 2025 Cassie Crossley, VP of Supply Chain Security, Cybersecurity and Product Security Office, Schneider Electric The rising frequency of software supply chain attacks has revealed…

Read MoreSecurity by Design: A Imperative for Software Development

Active Directory Recovery and Business Resilience Webinar

We Appreciate Your Registration with ISMG Enhance your profile and remain informed Select Title LevelAnalytics/Architecture/EngineeringAttorney / General Counsel / CounselAVPBoard of DirectorC-levelC Level – OtherCCOCEO / PresidentCFOChairpersonCIOCISO / CSOCISO/CSO/CIOCOOCROCTODirectorEVP / SVP / FVPHeadHealthcare ProfessionalManagerManager / SupervisorPartnerSpecialist/OtherStaffVP–Other Title Level– Select Job FunctionAnti-Money Laundering (AML)AuditBSABusiness Continuity/Disaster RecoveryBusiness DevelopmentCashier / Customer Service /…

Read MoreActive Directory Recovery and Business Resilience Webinar

Leveraging Zero Trust to Safeguard Cloud Workloads

Artificial Intelligence & Machine Learning, Governance & Risk Management, Next-Generation Technologies & Secure Development AI-Driven Security Enhances Continuous Monitoring for Distributed Enterprise Applications Ashish Khanna • March 12, 2025 Image: Shutterstock Cloud workloads are crucial engines for modern organizations, managing operations from financial transactions to healthcare services. However, their distributed…

Read MoreLeveraging Zero Trust to Safeguard Cloud Workloads