Building Resiliency in the Energy Industry
The Energy and Utility industries are among some of the most targeted sectors in regards to cyberattacks. The sheer amount of customers served across these two industries makes them an attractive target for threat actors. Any outage has the potential to negatively affect hundreds of thousands of customers worldwide, so ... Read More
Vulnerability Management in the Healthcare Industry
Previously, we’ve discussed how cyber vulnerabilities are among the top threats that affect organizations today, and we have also discussed how one of the most effective responses to those vulnerabilities is to embark on a maturity journey in establishing a vulnerability management program for the organization. Healthcare is among those ... Read More
Healthcare Vendor Risk Management (VRM) Is More Important Than Ever
The healthcare industry has long been a prime suspect for cybercriminals looking to gain access to patients’ personal information or to disrupt the operations of healthcare facilities. The recent adoption of new technology and remote work has created more potential targets for hackers. Data breaches in the healthcare industry have ... Read More
Integrated Risk Management (IRM) in the Insurance Industry
Integrated Risk Management has become a necessary and extremely beneficial strategy for organizations to effectively and proactively manage risk across the board. A strong IRM strategy will demonstrate the full scope of risk across the business so the organization can make continuous improvements to the risk management program for better ... Read More
How Internal Audit Brings Value To Your Third-Party Risk Management Program
Organizations have become increasingly reliant on third-parties to deliver core products and services to their customers. About 82% of companies provide third-party vendors with highly privileged roles. This is a major risk to sensitive data leakage and may pose both a security risk, as well as serious privacy risk to ... Read More
Managing Vendor Risk with Iceberg and ServiceNow
The complexity of vendor networks seems to grow with each passing year. While that complexity can be daunting, there are ways that we can handle it while also ensuring the safety and compliance of our organizations. When we ask ourselves how we can properly and effectively manage vendor risk — ... Read More
Demonstrate ROI on your Security Incident Response Program
With the rapidly evolving nature of today’s technology and risk landscape, organizations need an equally responsive Security Incident Response solution that can be implemented and taken advantage of in a short amount of time. That’s why we’ve developed the Iceberg Rapid Delivery SecOps: Security Incident Response program. This Rapid Delivery ... Read More
The Key To A Strong Vendor Risk Management Program Is A Solid Foundation
Vendor risk is just one of the many facets required of a strong risk management program and should be paid equal attention. But due to its disconnected nature from the core of the organization, it can be difficult to demonstrate the criticality of a strong vendor risk management program to ... Read More
Is Your Business Safe? How To Get Your Vulnerability Response Management Program Running In 8-10 Weeks
Vulnerability response management is a critical function of any Security Operations program. Having the tools and expertise in place to recognize and respond to vulnerabilities throughout all surfaces and assets within your organization can help ensure that your organization remains safe. We understand that getting a Vulnerability Response Management program ... Read More
Identifying Vendor Risks
Now, more than ever, organizations are outsourcing their operations, suppliers, software and much more to save budget, time, or to gain an edge on their competitors. As organizations take on more and more third-parties, the opportunity for risks to severely disrupt the business multiply, and so vendor risk management is ... Read More