Threat Intelligence

12:00 AM
Dark Reading
Dark Reading
Products and Releases

Retail Cyber Intelligence Sharing Center Names New Executive Director

The Retail Cyber Intelligence Sharing Center (R-CISC) will expand its sharing capabilities in the coming months.

Washington, DC -- The Retail Cyber Intelligence Sharing Center (R-CISC) announced today it has hired Suzie Squier to serve as its executive director. As executive director of the center, Squier reports directly to the R-CISC Board of Directors and is responsible for management of the organization, and continuing to develop and expand the capabilities of the center’s Information Sharing and Analysis Center (ISAC).

Squier has been connected to the R-CISC from day one and has a wealth of management experience. In her previous role at the Retail Industry Leaders Association (RILA), Squier was integral in the origination and formation of the R-CISC. As RILA’s executive vice president of member services, she also oversaw the membership and marketing functions, and had oversight of the CIO Leaders Council, Cybersecurity Leaders Council and the Internal Audit Committee.

"The Board of Directors is excited about what the future holds for the R-CISC with the team in place and the addition of Suzie and her leadership," Jim Cameli, chair of the R-CISC and global CISO at Walgreens Boots Alliance, said. "We have a great deal of positive momentum, and are looking forward to implementing the next iteration of R-CISC’s sharing platform."

Squier officially began as executive director of the R-CISC earlier this month. She replaced Brian Engle who had previously served in the role. Squier oversees all operations of the R-CISC, including the Retail ISAC, membership engagement and education. She will play an integral role in continuing to move the R-CISC forward. Two key aspects of that are the new sharing architecture to be announced later this summer and the R-CISC’s Retail Cyber Intelligence Summit, in Chicago later this year.

“I look forward to continuing to develop the R-CISC’s capabilities and build solid peer-to-peer relationships within our community, with the government and in cross-sector relationships, to expand the real-time sharing of cyber threat intelligence and better protect the industry as a whole,” Squier said about her new role. Read more in Squier's recent post on the R-CISC blog.

Squier will carry on the R-CISC’s engagement and partnerships with leading academic institutions, industry trade associations, government, law enforcement and cross-sector sharing forums. She will actively engage private sector stakeholders and government agencies to facilitate information sharing and strengthen the retail industry’s capability and capacity to mitigate risk from cyber attacks.

The R-CISC is the trusted cybersecurity community for retailers. consumer product manufacturers, grocers, hotels, restaurants, and cybersecurity industry partners worldwide. 

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
13 Russians Indicted for Massive Operation to Sway US Election
Kelly Sheridan, Associate Editor, Dark Reading,  2/16/2018
From DevOps to DevSecOps: Structuring Communication for Better Security
Robert Hawk, Privacy & Security Lead at xMatters,  2/15/2018
Facebook Aims to Make Security More Social
Kelly Sheridan, Associate Editor, Dark Reading,  2/20/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Current Issue
How to Cope with the IT Security Skills Shortage
Most enterprises don't have all the in-house skills they need to meet the rising threat from online attackers. Here are some tips on ways to beat the shortage.
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.