Management, compliance & auditing January 10, 2018 Susan Morrow How to Assess & Manage Third-Party Vendor Security Risks One of the most famous and largest cyberattacks of all time was the Target breach of 2013. The attack exposed the data records of more than 70 million people...
Management, compliance & auditing January 9, 2018 Graeme Messina Understanding the Link Between Business, Operational & Security Risks When it comes to risk planning and mitigation, it is important for you as an information security professional to understand the difference between a security...
Management, compliance & auditing January 8, 2018 Kieran Sullivan A Look at Data Security Compliance & Regulations by Industry Understanding and complying with regulations provides companies with business opportunities and reduces risk. To many, information security looks to be governed...
Management, compliance & auditing January 5, 2018 Susan Morrow 10 Ways GDPR Will Affect Data Collection and Use The General Data Protection Regulation (GDPR) is almost upon us. May 25th, 2018 is the auspicious day that begins the enactment of the regulation. In a survey...
Management, compliance & auditing January 5, 2018 Penny Hoelscher How Cyber Insurance Can Safeguard Your Business – A General Guide Cyber insurance is also known as cyber liability insurance coverage. It helps businesses and individuals protect themselves from Internet- and IT infrastructure-based...
Management, compliance & auditing January 4, 2018 Infosec Risk treatment options, planning and prevention Risk – it’s an inherent part of doing business in any industry or niche. Risks exist in a myriad of forms, ranging from financial to cyber-attacks, and...
Management, compliance & auditing December 15, 2017 Daniel Dimov Tips for Drafting Efficient Employee Information Security Policies Employee information security policies impose obligations on employees of organizations which aim to reduce the risks of cyber-attacks. Such policies usually...
Management, compliance & auditing December 14, 2017 Sayaala Disaster Recovery Types Before understanding the various methodologies and techniques for disaster recovery, it is essential to know what the term "disaster recovery" means in the...
Management, compliance & auditing October 31, 2017 Daniel Brecht Best practices for implementing an IT/cybersecurity policy An essential part of a company's cybersecurity program is the creation and implementation of a workplace security policy, a document that outlines all plans...
Management, compliance & auditing August 31, 2017 Penny Hoelscher Intelligent Personal Assistant (IPA) Sample Security Policy One of the earliest (a little bit intelligent) digital personal assistants was the annoying Microsoft Clippit, circa 1997. The animated MS Office paperclip...