Top 5 Must Reads: 8/18/2023
You already know that every day at?InformationWeek?there will be original reporting from our team of journalists and unique commentary you won’t see anywhere else. But in case you missed them, here are some of our favorites from this week:
1. Global Data Protection Laws
Story by?Joao-Pierre Ruth
Key Points:
2. Microsoft's Email Breach
Story by?Shane Snider
Key Points:
3. Cloud Costs & Considerations
Story by?John Edwards
Key Points:
4. Cyber Workforce Needs
Story by?Carrie Pallardy
Key Points:
5. FCRA Expansion
Story by?Shane Snider
Key Points:
Latest Major Tech Layoff Announcements
Original Story by?Jessica C. Davis, Updated by?Brandon J. Taylor
领英推荐
Key Points:
REGISTER NOW:
"Cyber Resiliency 2023: How to Keep IT Operations Running, No Matter What" LIVE webinar on 8/24 - a co-branded presentation between?InformationWeek?&?ITPro Today
On Thursday – August 24, beginning at 11am ET – tune into?our free online webinar featuring?Candy Alexander, CISSP CISM?-?CISO & Cyber Practice Lead?at?NeuEon Inc., and?Christian Hyatt?-?CEO & Co-Founder?at?risk3sixty?as our keynote speakers!
Our panel discussion on 'How to Respond to a Cloud Service Outage' will be lead by?Ben Cook?-?Regional Architect?at?Mandiant (now part of Google Cloud),?Darrius Robinson, CISSP?-?Web App Penetration Tester?at?SecurIT360,?Gautam ‘Gotham’ Sharma?-?CISO & Executive Director, Cybersecurity Education & Training?at?AccessCyber, and?Klaus Haller?- Senior Security Architect at?AXA Switzerland.
This live virtual event will be moderated by?our colleague?Steven Hill.?REGISTER?now at the link above.
"Cyber Resiliency 2023: How to Keep IT Operations Running, No Matter What"
It’s clear that IT needs fewer bells and whistles in cybersecurity and operational alerts, and more business bounce-back from attacks and outages.
Resiliency means your business must be able to take the punches and remain in full operation.?There are plentiful options but no guarantee that any single solution can provide resilience against onslaughts that vary from sudden cloud outages to prolonged ransomware attacks. A layered plan, however, could be just the thing. During this event, we share?what you need to consider.
Topics Include:
----
Cyber Risk Special Report
Behind the budget dollars allocated to cybersecurity defense and recovery efforts lies the question of where to spend them.
Cyberattacks and other threats to an organization’s ability to do business remain a top concern across all industries. Ransomware tops the list of threats, and it’s just getting worse as the operators succeed in getting more and more ransom payments. But ransomware is not the only threat. Many others come from outside as well as inside the organization and are both man-made and naturally formed. On top of all that comes the long-foretold AI wars – not yet here, but close.
Find Out:?
Against this backdrop companies try to battle and win against an onslaught of attackers.?Don't miss out on this critical research data!
Treasures from the Archives...
Story by?Carrie Pallardy
Key Points:
This is just a taste of what’s going on. If you want the whole scoop, then?register for one of our email newsletters,?but only if you’re going to read it.?We want to improve the sustainability of editorial operations, so we don’t want to send you newsletters that are just going to sit there unopened. If you're a subscriber already, please make sure Mimecast and other inbox bouncers know that we’re cool and they should let us through. And if you’re thinking about?subscribing,?then maybe start with the InformationWeek in Review; it only arrives on Fridays.