In the past, CISOs were responsible for protecting the organization’s computer systems, networks, and data. However, with the increase of cyber threats and the ever-changing landscape of technology, the role of a CISO has had to evolve. Now, CISOs are responsible for protecting the entire organization, not just the computer systems. They are also responsible for helping the organization to be more secure and resilient, and for protecting it from cyber threats.
In the digital age, we've seen a steady evolution of threats, but none perhaps as chilling as the rise of deep fake voices and videos. The ability to mimic someone's voice and use it for malicious intent—from convincing others to take potentially dangerous actions, to fraudulent payments, or even opening security gaps—is a threat too severe to overlook. So, how do we safeguard ourselves in a landscape where our ears can't always be trusted? Enter the challenge response phrase or word.
Today, I joined a panel at Austin Startup Week to discuss "How Unsupervised Neural Networking Roots Out Insider Threats." The conversation, took place at the Capital Factory here in Austin, Texas—an ideal setting for a forward-thinking cybersecurity discussion.
Internet of Things (IoT) devices such as fitness trackers and home security cameras are growing in popularity, but many people don’t realize that these devices can also be used to attack critical infrastructure. In 2017, a group of hackers used IoT devices to launch a massive attack on the internet infrastructure provider Dyn, and they were only able to do this because they were able to exploit devices that were using default passwords.
Steve Jobs agreed with the famous principle, “A-level people hire level A people, B-level people hire C-level people.” So Apple searches for A-players for crucial roles within their organization, and with good reason.
A vision without execution is a hallucination. If you’re the one responsible, the head of the ship, the bus driver, then it’s your job to execute!
As the world becomes increasingly digitized, the risk of cyberattacks against businesses, governments, and individuals alike has increased dramatically. Hackers can gain access to sensitive data, steal identities or financial information, or damage computer networks and critical infrastructure.
Critical infrastructure refers to those vital systems, networks, and assets whose incapacitation or destruction would have a debilitating effect on national security, the economy, public health, or any combination thereof. In the U.S., the Department of Homeland Security (DHS) has demarcated 16 specific critical infrastructure sectors. These sectors serve as the pillars that support the nation's day-to-day operations and its citizens' way of life.
I am delighted to announce the titles of my upcoming presentations for Black Hat 2023, both scheduled for August 10th. Here's a glimpse into what you can expect.
Austin Startup Week, since its inception in 2011, has always been a vibrant tapestry of Austin's entrepreneurial spirit. A unique confluence of entrepreneurs, local leaders, and enthusiasts, it offers a rich platform to connect, collaborate, and grow. This year marks the 13th iteration of this celebrated event, which will span from November 6-10, 2023. From enlightening sessions, hands-on workshops, to dynamic startup showcases and networking mixers, Austin Startup Week promises to be an engaging experience. To all those who celebrate the spirit of innovation and entrepreneurship, I wholeheartedly encourage you to register and be a part of this distinctive celebration of Austin's diverse community of trailblazers.