Axio VP Cyber Risk Engineering, Lisa Young Joins (ISC)² Board

Axio VP Cyber Risk Engineering, Lisa Young Joins (ISC)² Board

| | people, Press Releases
Axio would like to congratulate Lisa Young, Vice President of Cyber Risk Engineering for her appointment to the Board of Directors of (ISC)², the world’s largest nonprofit association of certified cybersecurity professionals. The association is considered the gold standard in cybersecurity accreditation and a rite of passage for cybersecurity leaders ... Read More

Axio’s New Partnership with NFP Expands Cybersecurity Capabilities

| | partnership, Press Releases
Axio is excited to announce our partnership with NFP. NFP is a leading insurance broker and consultant with expertise in employee benefits, property and casualty, retirement, and individual solutions. With this partnership, Axio released a new platform Axio360 QuickQuant, to expand cybersecurity capabilities. This partnership will give insurance buyers for ... Read More
Making Cybersecurity Dollars Count

Making Cybersecurity Dollars Count

| | Blog Posts, Quantification
With the power to decide how to allocate budget, the CFO plays a difficult and important role in cybersecurity investment decisions. As mentioned by Hugh Taylor in a recent article for The Journal of Cyber Policy, the challenge is “getting CFOs and boards to understand the financial impact of cyber ... Read More
Introducing Axio’s Most Popular Free Assessment Tools

Introducing Axio’s Most Popular Free Assessment Tools

| | assessment, Blog Posts
As the world recalibrates to the new normal, we’re giving back to the community by releasing our most popular assessment tools for free. Starting today, anyone can have an accurate and holistic view of what’s at risk in their organization. Cybercriminals, fraudsters, and others with malicious intent have no right ... Read More
Cyber Risk Management: Protecting Data, Infrastructure and People

Cyber Risk Management: Protecting Data, Infrastructure and People

| | Blog Posts, cyber-risk
What is Cyber Risk Management? Companies around the world have fallen victim to cyber adversaries. The detrimental effect of a successful attack can make it difficult for companies to recover. Because of many potential risks, cybersecurity has become an essential part of running a business. Cyber risk management is the ... Read More
Top 5 Cybersecurity Frameworks to Secure Your Organization 

Top 5 Cybersecurity Frameworks to Secure Your Organization 

| | assessment, Blog Posts
Cybersecurity Frameworks 101 Before we get into what the top cybersecurity frameworks are, let’s go through what exactly a cybersecurity framework is. All of these different cybersecurity frameworks provide standards and guidelines to secure your organization against cyber adversaries. Many industries have different cybersecurity requirements and standards. For example, the ... Read More

How to Implement NIST CSF

| | Blog Posts, NIST CsF
Addressing the most pressing NIST CSF question  When it comes to cybersecurity risk management, we are often asked how to implement the NIST Cybersecurity Framework. Before diving into the answer, we’d like everyone to know it can be an enjoyable and rewarding process. You can get started immediately  for free as a ... Read More
What is a Cyber Risk Assessment?

What is a Cyber Risk Assessment?

| | assessment, Blog Posts
Cyber Risk Assessments, Your Guide to a Secure Enterprise With cyber threats prevalent in almost every industry, cyber risk assessments are an essential part of securing your organization. An assessment allows you to identify and understand which assets in your organization can be affected by cyber incidents. It measures what ... Read More
Cybersecurity: A Personal CEO Liability

Cybersecurity: A Personal CEO Liability

| | Blog Posts, Executive Briefing
“The analyst firm [Gartner] expects liability for cyber-physical systems (CPSs) incidents will pierce the corporate veil to personal liability for 75% of CEOs”. By 2024 the report predicts 75% of CEOs will be personally liable for cybersecurity incidents. This means that insurance policies will no longer be able to cover ... Read More

Moving Above and Beyond Compliance, Part 2: Cybersecurity Best Practices

| | Blog Posts, Compliance
In part 1 of this blog series we discussed compliance firefighting. We mentioned that a proactive approach can reduce the amount of fires and save costs in the long run. In this part we’ll dive into the details and show how you can produce better security as an output from ... Read More