#wsjcyber: Become Trend on twitter at (2017-12-13 17:31)


People talking about #wsjcyber: - AdamJanofsky - AdamJanofsky - AdamJanofsky - KellyKane - DilTown - NickElliottDJ - Shirastweet - VeraSecurity - WilliamMalikTM - JYamani[...]
- KellyKane - Centrify - motolin5 - eileen_kemp - eileen_kemp - eileen_kemp - heel_be_ok - CastelliReports - Centrify - ronamarks - clive140 - nickg1421 - Centrify - keoght - Steve_Rosenbush - BurfordMuttley - Steve_Rosenbush - CloudinAround - Centrify - Centrify - CTTSchool - Jason_Healey - BeccaPL - Weazel1st - familybusiness1 - WSJRisk - srubenfeld - _MaryAnnMiller - Data_Sue_ATX - Data_Sue_ATX - rockynu - IDdriven - BrownUniversity - AdamJanofsky - AlanUsas - WilliamMalikTM - HartChart123 - WilliamMalikTM - SCastellWSJ - wisnefski - papervote - SCastellWSJ - CastelliReports - nickisoftness - AdamJanofsky - papervote - Steve_Rosenbush - CIOJournal - CIOJournal - HartChart123 - TrackerPayton - AdamJanofsky - SCastellWSJ - WilliamMalikTM - CIOJournal - Steve_Rosenbush - SCastellWSJ - Steve_Rosenbush - flavien_perier - AdamJanofsky - HartChart123 - wisnefski - CastelliReports - HartChart123 - Steve_Rosenbush - SCastellWSJ - HartChart123 - CIOJournal - AdamJanofsky - CastelliReports - CIOJournal - SCastellWSJ - WilliamMalikTM - AdamJanofsky - bobmcmillan - TrackerPayton - SCastellWSJ - Steve_Rosenbush - CastelliReports - ebcrew00 - SCastellWSJ - AdamJanofsky - SohailWSJ - HartChart123 - SCastellWSJ - AdamJanofsky - AdamJanofsky - VeraSecurity - HartChart123 - FortaliceLLC

This Tag appearing in: United States: ( Albuquerque - Atlanta - Austin - Baltimore - Birmingham - Boston - Charlotte - Chicago - Cincinnati - Cleveland - Columbus - Denver - Detroit - El Paso - Fresno - Greensboro - Harrisburg - Honolulu - Houston - Jackson - Jacksonville - Kansas City - Long Beach - Los Angeles - Mesa - Miami - Milwaukee - Minneapolis - Nashville - New Haven - New Orleans - New York - Norfolk - Omaha - Orlando - Philadelphia - Phoenix - Portland - Providence - Raleigh - Richmond - Sacramento - St. Louis - Salt Lake City - San Diego - San Francisco - San Jose - Seattle - Tallahassee - Tampa - Tucson - Virginia Beach - Washington - United States - ).
Popular tweets tagged with #wsjcyber:
#wsjcyber Centrify @Centrify🔁 Just arrived at #wsjcyber event in Nyc. @Centrify sponsoring event
loading...
Adam Janofsky @AdamJanofsky🔁CrowdStrike CEO says businesses need to make breaches less valuable to hackers. Reduce information, quickly shut dow twitter.com n compromised accounts
Adam Janofsky @AdamJanofsky🔁Crowd strike CEO George Kurtz: Biggest worries for banks is destructive attacks like Petra -- tens of millions of dol twitter.com lars in damage and the whole company can be taken offline
Adam Janofsky @AdamJanofsky🔁Fmr Homeland Security Secretary Michael Chertoff says biggest concern for him are global attacks that can "cause the twitter.com lights to go out," especially attacks against critical infrastructure
KellyKane @KellyKane🔁Attackers’ goals are to take intellectual property. Lowering the dwell time to determine an attack is critical via twitter.com
Nick Elliott @NickElliottDJ🔁Paul Ferrillo of Weil Gotshal: breached cos "need all the friends they can get" among govt bodies, need to build relationships. #WSJCYBER
Shira Rubinoff @Shirastweet🔁Great catching up with at the Conference. General Touhill discussed the biggest threats in an organization are: C twitter.com arelessness, Negligence, & Indifference.

Vera @VeraSecurity🔁And we’re back! leading us through an incident response plan for how to handle (and prepare for) a breach. twitter.com
JoAnn Yamani @JYamani🔁More than half of audience at event say insider threats are their biggest concern. Sometimes that threat is clearly malicious, but plenty of times it comes from negligence internally
Centrify @Centrify🔁What are the biggest security issues - Excessively employee access is the first highlighted concern at Conference focuses on this issue
Johnny@親孝行垢 @motolin5🔁Executives polled at
"What Threat Is Your Biggest Concern?"
= 56%
Criminal = 23%
= 20%
The element is a critical one. Implementing such as is critical for your infrastructure
Eileen Kemp @eileen_kemp🔁We're thrilled to sponsor and join and fellow experts for some exciting discussions today.
Alexander W. Mitchell @heel_be_ok🔁 ‘not prepared’ for challenge of Connected Device Manufacturers Not Addressing Cyber Risks via
Centrify @Centrify🔁We're thrilled to sponsor and join and fellow experts for some exciting discussions today. twitter.com
Ronald Marks @ronamarks🔁At , gives shout out to New York Cyber Task Force report on bringing cyber asymmetry to the side of the defense. Says biggest threat is commoditization of malware.
Tom Keogh @keoght🔁Former US CISO Greg Touhill says Cybersecurity isn’t a technology issue as much as it is a risk management issue.
Steve Rosenbush @Steve_Rosenbush🔁 ‘not prepared’ for challenge of Connected Device Manufacturers Not Addressing Cyber Risks via twitter.com
BurfordMuttley @BurfordMuttley🔁The latest World Peace through Inactivity! paper.li #privacy #wsjcyber
Steve Rosenbush @Steve_Rosenbush🔁Regulatory Compliance Is Only Part of Cybersecurity blogs.wsj.com via @WSJ #WSJCyber #cio #CISO #cybersecurity
Jeffrey Hall @CloudinAround🔁 Smith at FBI worries that new tech like AI and IoT won’t have cyber defenses built in from the start. #wsjcyber #browncyber
dominiek @Weazel1st🔁 Michael Chertoff: Insider threats are not just the source of a threat, they are also the vector of attack. #wsjcyber
WSJ Risk&Compliance @WSJRisk🔁Financial institutions that focus cybersecurity efforts merely on regulatory compliance may not be protecting their c twitter.com ompany very well, a panel said at


Samuel Rubenfeld @srubenfeld🔁Financial institutions that focus cybersecurity efforts merely on regulatory compliance may not be protecting their c twitter.com ompany very well, a panel said at


Mary Ann Miller @_MaryAnnMiller🔁 When asked about top threats, Chris Krebs, DHS mentions “Commoditization of malware” among his list #WSJCyber
Sue Love @Data_Sue_ATX🔁 Ex-Yahoo CISO Bob Lord says job of a CISO is to change the economics of hacking. #WSJCYBER
vvv.rocky.nu @rockynu🔁PEDIGREE DENTASTIX Large Dog Chew Treats, Fresh, 28 Treats #wsjcyber Link: goo.gl
IDdriven @IDdriven🔁Michael Chertoff: Insider threats are not just the source of a threat, they are also the vector of attack. #wsjcyber
Brown University @BrownUniversity🔁Excited to be at event talking to prospective students and sponsors. brown.edu
Adam Janofsky @AdamJanofsky🔁DHS's Christopher Krebs says U.S. has a good critical infrastructure framework (16 sectors are considered critical) b twitter.com ut other countries like the U.K. need to beef up their protections
Alan Usas @AlanUsas🔁Biggest cyber risk is careless, negligent, indifferent people. Vendors need to take out human factor as cause per Tou twitter.com hill and Krebs. Study at Brown to learn how.
William John Malik @WilliamMalikTM🔁 us-cert.gov Chris Krebs, DHS, urges organizations to share information - securely - through AIS. Shared defense can prot twitter.com ect us all.
Chris Hart @HartChart123🔁Very important observation: collective cyberdefense will be -if it isn’t already - key. Government and industry must twitter.com work together to meet common threats.
Sara Castellanos @SCastellWSJ🔁 Surprising, given the increase in paperwork. #wsjcyber twitter.com
Stephen Wisnefski @wisnefski🔁Former US CISO Greg Touhill says biggest cybersecurity risk is carelessness, negligence and indifference within your own ranks. #wsjcyber
Sara Castellanos @SCastellWSJ🔁Former US CISO Gregory Touhill says greatest threat to security is still is careless, negligent, indifferent people i twitter.com n your own ranks. We need to train people better.
Christopher Castelli @CastelliReports🔁 #1 threat now is commoditization of malware, says Dept of Homeland Security's Chris Krebs. #WSJCYBER
Nicki Softness @nickisoftness🔁At , gives shout out to New York Cyber Task Force report on bringing cyber asymmetry to the side of the defense. Say twitter.com s biggest threat is commoditization of malware.
Adam Janofsky @AdamJanofsky🔁Now on election security... it's about sharing info, best practices, and helping states that don't have good infosec twitter.com resources, says DHS's Christopher Krebs
Richard Akerman @papervote🔁Chertoff: Cyberattacks Hint at Nation-State Effort to Build Database of Americans blogs.wsj.com
Steve Rosenbush @Steve_Rosenbush🔁@C_C_Krebs says: beware the commodification of #malware #wsjcyber #cio #ciso
loading...
CIO Journal @CIOJournal🔁 Fmr U.S. CISO Gregory Touhill says Trump admin's cyber strategy has been more or less in-line with Obama's #WSJCyber
Chris Hart @HartChart123🔁One security struggle: rebalancing the asymmetries between defense (you have to meet all threats all the time) v off twitter.com ense (you just have to break through once).
Theresa Payton @TrackerPayton🔁When asked about top threats, Chris Krebs, DHS mentions “Commoditization of malware” among his list #WSJCyber
Adam Janofsky @AdamJanofsky🔁Russia, China, Iran, North Korea are still threats, says DHS's Krebs, but a big new worry is the commoditization of r twitter.com ansomware -- hacking tools for the masses
Sara Castellanos @SCastellWSJ🔁#1 threat now is commoditization of malware, says Dept of Homeland Security's Chris Krebs. #WSJCYBER
Steve Rosenbush @Steve_Rosenbush🔁 Majority of audience members here say government agencies should do more to regulate the security of IOT devices. #WSJCYBER
Sara Castellanos @SCastellWSJ🔁Vast majority of audience members here said cybersecurity policy under Trump administration is about the same compare twitter.com d to the Obama administration
Steve Rosenbush @Steve_Rosenbush🔁Gregory Touhill #CyberSecurity is ‘really risk management’
@C_C_Krebs must centralize security across federal govt #wsjcyber #ciso #cio
Flavien @flavien_perier🔁 "We've got to make sure we centralize cybersecurity roles across government" says DHS's Christopher Krebs #WSJCyber
Adam Janofsky @AdamJanofsky🔁"We've got to make sure we centralize cybersecurity roles across government" says DHS's Christopher Krebs #WSJCyber
Chris Hart @HartChart123🔁This panel is observing that cybersecurity is apolitical. That to me seems aspirational. Let’s not forget: agencies c twitter.com reate regulations and set enforcement priorities. Congress struggles passing national cybersecurity legislation. It’s a tough sell.
Stephen Wisnefski @wisnefski🔁Former US CISO Greg Touhill says Cybersecurity isn’t a technology issue as much as it is a risk management issue. twitter.com
Christopher Castelli @CastelliReports🔁One unresolved question is when the White House plans to release a formal strategy document, which had been slated f twitter.com or release this fall:
Chris Hart @HartChart123🔁It’s remarkable that a constant theme throughout this conference is thinking about cybersecurity as risk management a twitter.com nd not just tech - and that important perspective extends to government.
Steve Rosenbush @Steve_Rosenbush🔁@C_C_Krebs there is no beta in national critical infrastructure #wsjcyber #cio #ciso #CyberSecurity
Sara Castellanos @SCastellWSJ🔁US Dept of Homeland Security's Chris Krebs says increasingly the approach to security is less about facilities that u twitter.com nderpin the national economy but what the functions are - payment clearing, water, and what critical assets that ensure operations
CIO Journal @CIOJournal🔁James Trainor: At FBI we lost cyber agents to private sector; competed with higher pay, advanced education
Adam Janofsky @AdamJanofsky🔁Christopher Krebs of the Dept of Homeland Security agrees--Trump admin is "standing on the shoulders of the prior tea twitter.com m" in terms of cybersecurity strategy
Sara Castellanos @SCastellWSJ🔁US Dept of Homeland Security's Chris Krebs says cybersecurity efforts under Trump are amplification of previous admin twitter.com istrations. "It's solid policy foundations that are continuing to build on each other."
William John Malik @WilliamMalikTM🔁James Trainor, SVP Cybersecurity at Aon, former FBI head of Cyber Division, says they lost 50 or so people to private twitter.com sector. "Provide training - the youngest person in the room is often the smartest person in the room on the particular issue."
Adam Janofsky @AdamJanofsky🔁Fmr U.S. CISO Gregory Touhill says Trump admin's cyber strategy has been more or less in-line with Obama's #WSJCyber
Robert McMillan @bobmcmillan🔁Hey if you’re at the #WSJCYBER event in NYC and you want to meet up today, DM me or email This email address is being protected from spambots. You need JavaScript enabled to view it.
Sara Castellanos @SCastellWSJ🔁Cybersecurity is now at top of agenda at federal level, says former US CISO (2016-2017). It's no longer a server room twitter.com issue, but board room issue.
Steve Rosenbush @Steve_Rosenbush🔁James Trainor: At FBI we lost cyber agents to private sector; competed with higher pay, advanced education #wsjcyber #ciso #cio #fbi
Christopher Castelli @CastelliReports🔁Next session on " under Trump" includes discussion w/ 's . ICYMI, here's primer on White House's May 11 executiv twitter.com e order:
Adam Janofsky @AdamJanofsky🔁Tip no. 3: Add "and it's security" to the end of every executive job description, says TruSTAR's Patrick Coughlin #wsjcyber
Sohail @SohailWSJ🔁Social media is certainly going to be pivotal and critical vector in next phase of Cybersecurity threats
#wsjcyber
Chris Hart @HartChart123🔁One important point that shouldn’t be lost about the C-Suite, discussed by the panel: C-Suite execs set the tone and twitter.com the example. What the firm leadership does relating to cybersecurity directly affects what employees do.
Sara Castellanos @SCastellWSJ🔁Add a couple of words: "... and its security" to the job titles of execs. It helps advance the way C-Suite thinks abo twitter.com ut the mission of the company.
Adam Janofsky @AdamJanofsky🔁Jim Trainor adds that it can even be helpful if you limit your profile online -- no LinkedIn or Facebook means fewer twitter.com hackers will know about you and use that info against you
Adam Janofsky @AdamJanofsky🔁One tip: white-list emails sent to executives, so anything that looks suspicious is tagged or filtered out, Coughlin says #WSJCyber
Vera @VeraSecurity🔁Protecting the C-Suite: 55% of audience members say their orgs DO take special measures to protect executives from . twitter.com James Trainor of & Patrick Coughli of discuss
Chris Hart @HartChart123🔁One best practice for corporate boards: create a communication structure. I would add: make it regular and often. I twitter.com t should be part of the ordinary course of the business and reporting structure.
Fortalice Solutions @FortaliceLLC🔁Education is huge in your cybersecurity defense strategy. Having the knowledge and precaution to spot malicious emai twitter.com ls and attempts to breakthrough is so much of that battle.

05

Star InactiveStar InactiveStar InactiveStar InactiveStar Inactive