News
Magazine Features
Opinions
News Features
Interviews
Editorial
Blogs
Reviews
Slackspace
Next-Gen Infosec
Webinars
White Papers
Podcasts
Industry Events & Training
Magazine Events
Online Summits
Company Directory
Application Security
Automation
Big Data
Business Continuity
Cloud Security
Compliance
Cybercrime
Data Protection
Digital Forensics
Encryption
Human Factor
Identity Access Management
Industry Announcements
Internet Security
Malware
Managed Services
Mobile Security
Network Security
Payment Security
Physical and Information Security Convergence
Privacy
Risk Management
The Internet of Things
News
Topics
Features
Webinars
White Papers
Podcasts
Events
Events & Conferences
Directory
Infosecurity Magazine Home
»
Webinars
»
Shielding Yourself: A CISO's Guide to Personal Liability Protection
Shielding Yourself: A CISO's Guide to Personal Liability Protection
Webinar
18 Feb 2025
Speakers
Jessica Nall
Partner, Baker & McKenzie LLP
Why not watch?
What’s It Really Like to be a CISO?
24 Nov 2015
#IMOS18 - CISO Interview; Paul Watts, Dominos
11 Sep 2018
Pluralsight Keynote: AI in Cybersecurity From Compliance to Threat Defense
18 Feb 2025
How CISO's Can Survive and Thrive in a Complex Cyber Landscape
18 Feb 2025
You may also like
Business Confidence in Cloud Security Grows
News
13 Jan 2016
Over Half of Organizations Report Serious OT Security Incidents
News
5 Mar 2025
BlackLine CISO Jill Knesek on Building Security Teams and Tackling Ransomware
Interview
3 Mar 2025
CISOs Boost Crisis Simulation Budgets Amid High-Profile Cyber-Attacks
News
27 Jan 2025
Top CISO Focuses for Navigating Cybersecurity in 2025
Opinion
10 Jan 2025
What’s hot on Infosecurity Magazine?
Read
Shared
Watched
Editor's Choice
Nine in Ten Healthcare Organizations Use the Most Vulnerable IoT Devices
News
28 Mar 2025
1
Solar Power System Vulnerabilities Could Result in Blackouts
News
28 Mar 2025
2
Trump CISA Cuts Threaten US Election Integrity, Experts Warn
News
28 Mar 2025
3
Morphing Meerkat PhaaS Platform Spoofs 100+ Brands
News
28 Mar 2025
4
Nigerian 'Yahoo Boys' Behind Social Media Sextortion Surge in the US
News
29 Jan 2024
5
CoffeeLoader Malware Loader Linked to SmokeLoader Operations
News
27 Mar 2025
6
Threat Actors Abuse Trust in Cloud Collaboration Platforms
News
26 Mar 2025
1
China-Linked Weaver Ant Hackers Exposed After Four-Year Telco Infiltration
News
25 Mar 2025
2
NIST Warns of Significant Limitations in AI/ML Security Mitigations
News
25 Mar 2025
3
California AG Reminds 23andMe Customers of Data Deletion Rights Amid Bankruptcy Filing
News
24 Mar 2025
4
Gartner Warns Agentic AI Will Accelerate Account Takeovers
News
19 Mar 2025
5
Fortinet Vulnerability Exploited in Ransomware Attack, CISA Warns
News
19 Mar 2025
6
Cyber Resilience in the AI Era: New Challenges and Opportunities
Webinar
25 Mar 2025
1
AI Agents and the Evolving Landscape of Digital Identity
Webinar
27 Mar 2025
2
How to Update Your PAM Strategy to Protect Hybrid Cloud Infrastructures
Webinar
27 Mar 2025
3
The Threat Intelligence Imperative: Transforming Risk into Cyber Resilience
Webinar
13 Mar 2025
4
How to Manage Your Risks and Protect Your Financial Data
Webinar
30 Oct 2024
5
Enhancing Software Supply Chain Management: A DORA-Focused Approach
Webinar
30 Jan 2025
6
Gatwick Airport's Cybersecurity Chief on Supply Chain Risks and CrowdStrike Outage
Interview
21 Nov 2024
1
You're Hired! The Truth About Certifications in Cybersecurity Careers
News Feature
2 Dec 2024
2
T-Mobile Claims Salt Typhoon Did Not Access Customer Data
News
28 Nov 2024
3
Darknet Services Fuel Holiday Scams and E-Commerce Exploits
News
26 Nov 2024
4
Top 10 Cyber-Attacks of 2024
News Feature
2 Dec 2024
5
Google Deindexes Chinese Propaganda Network
News
25 Nov 2024
6