Why You Need a Concrete Incident Response Plan (Not Strategy)

Recently, I had the privilege to be part of a four-person discussion panel at a security event in London where the topic was about incident response. The panel was hosted by another ...
‘Security as Necessary Evil’ Mentality

3 Ways CISOs Can Break Out of the ‘Security as Necessary Evil’ Mentality

Security Boulevard Exclusive Series: What I Learned About Being a CISO After I Stopped Being a CISO In this series we’re talking with former CISOs to collect the lessons they’ve learned about ...
Security Boulevard
vsRisk Cloud - ISO 27001 risk assessments made simple

Understanding the 7 different types of data breaches

Every day more than 6 million data records are compromised, with no organisation or sector immune. Organisations are facing a data breach war so it’s imperative that ‘know your enemy’ becomes part ...
Chief Enterprise Intelligence Officer

Chief Enterprise Intelligence Officer: Necessary Addition to the C-Suite?

CEIOs can provide a level of intelligence to cybersecurity that currently isn’t there Historically, C-level executives haven’t been involved in their organization’s cybersecurity efforts. Even now, with the number of high-profile data ...
Security Boulevard
CISOs Can Boost Their Credibility

3 Ways CISOs Can Boost Their Credibility Within the Enterprise

Security Boulevard Exclusive Series:  What I Learned About Being a CISO After I Stopped Being a CISO In this series we’re talking with former CISOs to collect the lessons they’ve learned about ...
Security Boulevard
Are Third-Party Vendors Your Biggest Cybersecurity Risk? — CyberSpeak Podcast

Are Third-Party Vendors Your Biggest Cybersecurity Risk? — CyberSpeak Podcast

On this episode of the CyberSpeak with InfoSec Institute podcast, Fred Kneip, CEO of CyberGRX, discusses security risks for companies that work with third-party vendors — those both globally focused... Go on ...

Best Practices for Conducting a Risk-Based Internal Audit

| | risk management
Introduction Over the last few years, cyber-crimes have grown in number and in the ways cybercriminals exploit them. Due to this, the need to manage risks has been recognized by organizations and ...
vsRisk Cloud - ISO 27001 risk assessments made simple

Two thirds of organisations uninsured against a data breach

Two thirds of UK organisations are uninsured against the financial impact of a data breach, a survey has revealed. NTT Security’s Risk:Value 2018 report found that only 29% of organisations have dedicated ...
CISOs Pump Up Political Prowess

3 Ways CISOs Can Pump Up Their Political Prowess

Security Boulevard Exclusive Series:  What I Learned About Being a CISO After I Stopped Being a CISO In this series we’re talking with former CISOs to collect the lessons they’ve learned about ...
Security Boulevard

The Challenges of Managing Third-Party Vendor Security Risk

It’s no longer enough to secure your own company’s infrastructure; you now must also evaluate the risk of third-party vendors and plan and monitor for breaches there, too. Data breaches are reported ...
Loading...