A CISO's Guide to Phishing and Malware

By Joel Rosenblatt,Columbia University Director of Computer and Network Security 

Brought you to by Proofpoint

A CISO's Guide to Phishing and Malware examines real-world examples of advanced targeted attacks via email and social media to show how these evolving threats are increading an organization's business risks. 

Cybercrime is very much a B2B affair with surging returns on investment. From a business perspective, there is always a number associated with a breach. For example, Columbia University calculates every exposed Social Security number costs organizations $195. This number represents only a fraction of the total cost; losses to the breached companies, the people whose data has been stolen, and to society as a whole aren’t easily measured.

More specifically, this book explores attack vectors such as email, in particular, the Business Email Compromise (BEC) that are being exploited as never before.

It also presents ways CISOs can confront those increasing risks and offers best practices for articulating the value of these tools to the C-suite.

Read it now, no registration required!

A CISO's Guide to Principles of Data Privacy and Security

A CISO's Guide to Principles of Data Privacy and Security by David Sheidlower, currently CISO for an international media and advertising firm, examines the key issues surrounding data privacy and security.

In this Security Current ebook, David Sheidlower provides his perspective on topics, which include privacy policies, big data, consent, governance and security.

According to the author: “The fundamental principles of privacy and security continue to evolve.  I’ve tried to look into each of them from the consent process, which most people find problematic, to the need for a framework for data protection, which is where an organization’s security program comes in.”

The ebook has been lauded by Sheidlower’s peers, with Larry Whiteside Jr., CISO of the Lower Colorado River Authority (LCRA), stating: “It provides thought provoking and actionable information on issues that are top of mind for us – data privacy and security. I highly recommend reading it.”

Read it now, no registration required!


About Security Current | Privacy Policy | Subscribe to our newsletter