Building Resiliency in the Energy Industry

The Energy and Utility industries are among some of the most targeted sectors in regards to cyberattacks. The sheer amount of customers served across these two industries makes them an attractive target for threat actors. Any outage has the potential to negatively affect hundreds of thousands of customers worldwide, so ... Read More

Vulnerability Management in the Healthcare Industry

| | cyber-risk
Previously, we’ve discussed how cyber vulnerabilities are among the top threats that affect organizations today, and we have also discussed how one of the most effective responses to those vulnerabilities is to embark on a maturity journey in establishing a vulnerability management program for the organization. Healthcare is among those ... Read More

Healthcare Vendor Risk Management (VRM) Is More Important Than Ever

| | Third Party Risk
The healthcare industry has long been a prime suspect for cybercriminals looking to gain access to patients’ personal information or to disrupt the operations of healthcare facilities. The recent adoption of new technology and remote work has created more potential targets for hackers. Data breaches in the healthcare industry have ... Read More

Integrated Risk Management (IRM) in the Insurance Industry

| | IRM & GRC
Integrated Risk Management has become a necessary and extremely beneficial strategy for organizations to effectively and proactively manage risk across the board. A strong IRM strategy will demonstrate the full scope of risk across the business so the organization can make continuous improvements to the risk management program for better ... Read More

How Internal Audit Brings Value To Your Third-Party Risk Management Program

| | Audit, Third Party Risk
Organizations have become increasingly reliant on third-parties to deliver core products and services to their customers. About 82% of companies provide third-party vendors with highly privileged roles. This is a major risk to sensitive data leakage and may pose both a security risk, as well as serious privacy risk to ... Read More

Managing Vendor Risk with Iceberg and ServiceNow

The complexity of vendor networks seems to grow with each passing year. While that complexity can be daunting, there are ways that we can handle it while also ensuring the safety and compliance of our organizations. When we ask ourselves how we can properly and effectively manage vendor risk — ... Read More

Demonstrate ROI on your Security Incident Response Program

| | cyber-risk, ServiceNow
With the rapidly evolving nature of today’s technology and risk landscape, organizations need an equally responsive Security Incident Response solution that can be implemented and taken advantage of in a short amount of time. That’s why we’ve developed the Iceberg Rapid Delivery SecOps: Security Incident Response program. This Rapid Delivery ... Read More

The Key To A Strong Vendor Risk Management Program Is A Solid Foundation

Vendor risk is just one of the many facets required of a strong risk management program and should be paid equal attention. But due to its disconnected nature from the core of the organization, it can be difficult to demonstrate the criticality of a strong vendor risk management program to ... Read More

Is Your Business Safe? How To Get Your Vulnerability Response Management Program Running In 8-10 Weeks

| | cyber-risk, ServiceNow
Vulnerability response management is a critical function of any Security Operations program. Having the tools and expertise in place to recognize and respond to vulnerabilities throughout all surfaces and assets within your organization can help ensure that your organization remains safe. We understand that getting a Vulnerability Response Management program ... Read More

Identifying Vendor Risks

Now, more than ever, organizations are outsourcing their operations, suppliers, software and much more to save budget, time, or to gain an edge on their competitors. As organizations take on more and more third-parties, the opportunity for risks to severely disrupt the business multiply, and so vendor risk management is ... Read More