Mitigating Bot Attacks and Reducing User Friction: Modern Security Can Produce Win-Win Situations

In today’s digital ecosystem, users are accustomed to getting what they want—and getting it fast. Our phones unlock themselves at a glance, our laptops unlock with a swipe of our finger across a scanner, our laptops unlock because they recognize the presence of our pin-secured watch on our wrists. Research has shown that this kind…

Read More

Managing an Agile Security Operations Program

Building and improving a security operations program is challenging at any company, and even more so when that program was previously only focused on compliance. When Ken Loisch, global director of information security and compliance at Conair Corporation, first started at Conair four years ago, he changed the way the organization viewed security. The program…

Read More

Lessons Learned, New Beginnings

This month, as graduates move the tassel from one side of the cap to the other, I’m reminded of my undergraduate education in history and English at the University of Maryland (go Terps!). I became fascinated by the new beginnings that emerge after devastating tragedies. For example, the bubonic plague – known as the “Black…

Read More

Building a Security Operations Program

We recently sat down with Adam Hirsch, senior vice president of information security at PVH Corp., to discuss how he built his security program. When he started at PVH Corp. seven years ago, there were no formal security operations or risk functions. He had a five person security administration team spread across the U.S. and…

Read More

Member and BoD Spotlight: Colin Anderson, Global CISO, Levi Strauss & Co.

Colin Anderson, global CISO at Levi Strauss & Co., has been with the Retail & Hospitality ISAC since the beginning in 2014, when he and a small group of retail and hospitality organizations came together to develop an intelligence sharing community. As the current RH-ISAC Board Chair, and an IT executive with more than 25…

Read More