Wisconsin Bankers Association 2025 Security Officers Workshop | Navigating Zero Trust: Building Your Strategy and Roadmap

We need a new security model that more effectively adapts to the complexity of the modern environment, embraces the hybrid workplace, and protects people, devices, apps, and data wherever they’re located. In other words, we need to modernize our approach to cybersecurity. Zero Trust as “a cybersecurity strategy premised on the idea that no user … Continue reading Wisconsin Bankers Association 2025 Security Officers Workshop | Navigating Zero Trust: Building Your Strategy and Roadmap

ICBA Live 2025: The Future of Cybersecurity in Banking: Technological Innovations Ahead

The Future of Cybersecurity in Banking: Technological Innovations Ahead: How AI, Zero Trust, and Next-Gen Security Strategies are Reshaping Financial Institutions In an era where digital transformation is paramount, ensuring robust cybersecurity is crucial for the future of banking. This session will delve into the technological innovations that prioritize security while enhancing operational efficiency and … Continue reading ICBA Live 2025: The Future of Cybersecurity in Banking: Technological Innovations Ahead

Book Review: Cybersecurity Tabletop Exercises: From Planning to Execution

By Robert Lelewski, John Hollenberger I design and facilitate many incident response tabletop exercises (TTX) at work. When I saw this book announced by no starch press, I had to jump on the pre-sale. This was an easy read. I read and marked it up during a single flight. It is a resource that anyone charged … Continue reading Book Review: Cybersecurity Tabletop Exercises: From Planning to Execution

Navigating Cloud Security: Challenges and Solutions

The expanding reliance on cloud infrastructure introduces various security risks that traditional perimeter-based strategies cannot adequately address. Misconfigurations, poorly managed IAM, third-party vulnerabilities, insider threats, and new attack types like DoS and cryptojacking complicate security. Adopting a Zero Trust model, automation, and continuous monitoring are essential for improving cloud security posture.