A big warm welcome to our newest member of the Hubscale team! We are super excited for 2025 and thrilled to welcome Nathan Ward to the business. This is a significant moment for us as we continue to grow and strengthen our team. Nathan joins our Go-To-Market team as a Senior Search Consultant and will be working across Identity, Fraud and ZTNA vendors. With his impressive track record in the cybersecurity recruitment space, Nathan has a deep understanding of the industry and a proven ability to connect world-class talent with market-leading organizations. Nathan embodies our values at Hubscale and we couldn't be happier to have him onboard 🙏
Hubscale’s Post
More Relevant Posts
-
Really good conversation with Joe Fay and The Stack on Cyber Resilience, DORA (my favourite topic!) and much more. Please do take a few minutes to read & watch, and as ever, DM me if you want to chat about any of the topics covered :) Cohesity Olivier Savornin Martin Gittins Fraser Hutchison Laurent GARCIA ☁️ Thomas Herrguth Gregg Petersen Lesley Foster-Davis Michael Piontek #cyberesilience #DORA #CIO #CISO #operationalresilience #cybersecurity #digitaltransformation #collaboration #climatechange #sustainability #disasterrecovery #backups
Too often organisations “don't understand the capabilities that IT can provide to security and that security can provide to IT” says Cohesity’s Mark Molyneux. The Barclays veteran joined The Stack to talk #cyberesilience, #DORA, flooded airports and more. Full story 👉 https://lnkd.in/e-i4f9Kb #CIO #CISO #cybersecurity #digitaltransformation #collaboration #climatechange #disasterrecovery #backups
To view or add a comment, sign in
-
Security ProAdvisors is pleased to present our summer 2024 edition of “The Security Advisor” magazine. Highlights include industry, merger and acquisition activity, and an interview with Brian Reich, Assistant Vice President and Head of Corporate Security at insurance giant Kemper Corporation. #Security #SecurityProfessionals #SecurityManagement #SecurityMergerAndAcquisitions #SecurityTransactions #SecurityGuardIndustry #PrivateSecurity #Cyber Security
To view or add a comment, sign in
-
Do you want to protect your business against damaging cyber-attacks and phishing schemes? With "Securing Business Communication: A Guide to Email and Platform Safety," you can stay aware of the importance of email and platform security and implement tips for protecting your workers and business. Learn more - https://smpl.is/92aej #merIT #piedmontNC #piedmontNCbusiness
To view or add a comment, sign in
-
-
Talk about it. Reward for it. Make being “cyber smart” an honor. Too many organizations hand employees a packet of paper listing the “do’s and don’ts’ of cybersecurity (if anything at all) and label it done. Most employees will cram it in a desk drawer to collect dust. Make cybersecurity a part of your culture, where everyone knows how important it is and strives to keep the company safe. #companyculture #cybersecurity #businessowners #teamwork #merIT #piedmontNC
To view or add a comment, sign in
-
-
I am honored to have been named a HotTopics' Global CISO 100 Award winner for 2024, in partnership with Trellix. This accolade celebrates leading Chief Information Security Officers globally. #HotTopics #CISO #CSuiteAwards #Trellix While it may sound a bit oscar-ish to do this, I truly mean to say thank you to the jury for being part of this amazing set of peers (and friends) for 2024. While I may often be seen as just the one person, I frequently remind that I'm more of an anchorman of the newscast that can only exist with the investigative reporters in the backoffice to "do quality work". Nothing of what I do would be possible without my amazing teams (and I already know I'll overrun the number of people tagged in a post, so look for comments below for a longer -and still non exhaustive- list)... “Teamwork makes the dream work” has never been so true. Thanks for your fantastic work that makes this possible, Françoise, Caroline, Stéphane, Eric, Julien, Tessine, Mathias, Christophe in France, Gordon, Sam, Mike, Andy for the UK, Ben, Chris for Australia, and so many more. We also keep saying the CISO job needs management support… At Thales, we are fortunate to have leadership that not only understands the importance of cybersecurity but actively supports our endeavors, starting with Patrice all the way down. "Building a future we can all trust" is more than a company motto, it's how we work, relying on human intelligence, especially in the age of AI. Of course, none of this would be possible without the unwavering support of family and friends in joy and in sorrow, their encouragements uplift me. So thanks to this environment that supported me. Let's "trust forward" and keep working the way we do: trying to be better every day and make the world safer as much as we can at our level. #CISO #TOP100CISO #Thales #Cybersecurity #Gratitude #Teamwork #CyberIsATeamSport #TrustForward https://lnkd.in/esVi-qZA
To view or add a comment, sign in
-
-
Identity Threat Detection and Response (ITDR) has become increasingly important in the modern cybersecurity landscape. ITDR is a critical component of a cybersecurity platform that is designed to detect, prevent, and respond to identity-based threats. Identity-based threats refer to cyber threats that exploit user credentials to gain unauthorized access to sensitive data and systems. These threats include but are not limited to phishing attacks, brute force attacks, credential stuffing, and insider threats. The role of ITDR in a cybersecurity platform involves: 1. Threat Detection: ITDR tools use advanced technologies like machine learning and user behavior analytics to identify abnormal activities or behavior patterns that suggest a potential security threat. 2. Threat Prevention: Once a threat is detected, ITDR tools can take immediate preventive measures to prevent the threat from causing any harm. This could include blocking the suspicious activity, forcing a user re-authentication, or even disabling the user's account. 3. Threat Response: ITDR is not just about detecting and preventing threats but also responding to them. This might involve investigating the source of the threat, assessing the damage, and implementing a recovery plan. It could also involve notifying the affected users and regulatory authorities, if necessary. 4. Continuous Monitoring: ITDR tools continuously monitor user activities and security events to ensure real-time threat detection and response. They also provide detailed reports and logs for compliance and audit purposes. In summary, Identity Threat Detection and Response is crucial for protecting sensitive data and systems from identity-based cyber threats. It's an essential part of a comprehensive cybersecurity strategy.
CrowdStrike is a “cyber industry force” See why CrowdStrike was named an overall leader in the KuppingerCole Analysts AG Identity Threat Detection and Response (ITDR) Leadership Compass: https://lnkd.in/gUf9BRBD
To view or add a comment, sign in
-
Our newest vendor is... Halcyon! 🎉 We are absolutely thrilled to be partnering with Halcyon, a leading platform designed from day one to defeat ransomware. 🙌 Chris C., VP of Global MSSP and Channels at Halcyon said, “Our partner program expansion in the U.K. with Distology as a strategic partner will deliver the outcomes that business leaders want in response to ransomware - no business impact. With Halcyon’s anti-ransomware platform and Distology’s market acceleration, we can insulate customers from ransomware and give companies peace of mind.” Find out more about the tech unicorn here: https://lnkd.in/eq-GAEUK And find out more about the partnership here: https://lnkd.in/eTRXzbcb
To view or add a comment, sign in
-
-
🎙️New episode drop 🎙️ Nicola Sotira is back on The New CISO Podcast today to talk about his impressive success breaking into the business world. Coming from a tech background, he shares advice for others looking to make the transition. Tune in 🎙️ #NewCISOPodcast #CISO #CybersecurityLeadership #cybersecurity #tech #business
We’re joined again by Nicola Sotira, Head of CERT at Poste Italiane, who migrated from tech to business on an international scale. Talking with Exabeam’s Stephen Moore, Nicola shares how his “Viking mentality” helped him overcome challenges in his career—and why mentorship and team-building are critical for a strong IT security team. Sit back, relax, and enjoy: https://ow.ly/UyRR50TKY28 #NewCISOPodcast #CISO #CybersecurityLeadership #cybersecurity #tech #business
To view or add a comment, sign in
-
Do you have a plan in place to get you back up and running if a disaster occurs? Whether it’s a natural disaster that destroys your office or a cyber attack that shuts down your business, you need to have an incident response plan to mitigate the issue and reduce downtime to avoid more damage to your business. 👉And remember, creating the plan isn’t enough. Everyone on the team needs to know what they’re responsible for and what to do. Make sure to develop, test, review, and update the plan regularly. Need help making one? 📲Schedule a FREE 10-Minute Discovery Call to get started - https://smpl.is/9zri6 #merIT #piedmontNC
To view or add a comment, sign in
-
-
It’s been a while since I shared an update on the impactful work we’re doing at CyBlack. Earlier this year, we partnered with LetsDefend to equip aspiring SOC Analysts with hands-on skills to advance their careers. We launched our first cohort in June 2024, supporting 33 participants, and are now running a second cohort with 30 participants. So far, we’re proud to report that 8 academy members have secured jobs — four from the previous cohort and four from the current one. This partnership truly demonstrates Cyblack and LetsDefend’s commitment to bridging the cybersecurity skills gap and empowering the next generation of cybersecurity professionals. A big thank you to the team Jude Osamor Alero Mogbeyiteren Francisca Adekanye Valentine Okpalanozie Adeyinka Oloyede Elizabeth Ekedoro for their commitment and support.
To view or add a comment, sign in
-
Elliott Elliott Katie James Jake Aliyah Callum