Alyssa Miller: Charting the Course Through InfoSec and Aviation

In this episode, special guest Alyssa Miller joins the hosts for an insightful and entertaining conversation covering a broad range of topics from social engineering anecdotes involving Kevin Johnson to Alyssa’s journey ...
HR, cyberthreat, landscape, insider threats, HP Wolf TeamViewer, insider, application, insider risk, case, threat Palo Alto network IP theft

Why an HR-IT Partnership is Critical for Managing Cybersecurity Risk

By aligning priorities into a shared game plan, HR and IT can finally set their organizations up to defend against modern cyberthreats ...
Security Boulevard
How Good Company Culture can Increase Security

How Good Company Culture and can Elevate Security 

| | Blog, HR, insider risk
This Article How Good Company Culture and can Elevate Security  was first published on Signpost Six. | https://www.signpostsix.com/ Introduction A positive company culture may seem like a cliche’ term, but it is ...
What is UEBA?

What is UEBA? Unpacking User and Entity Behavior Analytics

| | Blog, HR, insider risk
This Article What is UEBA? Unpacking User and Entity Behavior Analytics was first published on Signpost Six. | https://www.signpostsix.com/ Introduction In today’s digital landscape, keeping security threats at bay is a continuous ...
Economic Crime and Corporate Transparency Bill - money Laundering

The Economic Crime and Corporate Transparency Bill’s Relevance to Insider Risk Management

| | Blog, HR, insider risk
This Article The Economic Crime and Corporate Transparency Bill’s Relevance to Insider Risk Management was first published on Signpost Six. | https://www.signpostsix.com/ Introduction The UK government has rolled out the Economic Crime ...
Human Risk

Understanding Human Risk: How It Intersects with Insider Risk

| | Blog, HR, insider risk
This Article Understanding Human Risk: How It Intersects with Insider Risk was first published on Signpost Six. | https://www.signpostsix.com/ Introduction: In an era where cybersecurity threats loom large, understanding and managing the human element ...
Security Training

Harnessing Security Training for Enhanced Organisational Resilience

| | Blog, HR, insider risk
This Article Harnessing Security Training for Enhanced Organisational Resilience was first published on Signpost Six. | https://www.signpostsix.com/ Introduction: In today’s digital landscape, cybersecurity threats are a growing concern for organisations. The evolving nature ...

HR’s Growing Role in Cybersecurity

Companies worried about cybersecurity should know that the real risk is inside their corporate firewall. Corporate leaders spend a lot of time worrying about nation-state actors and ransomware gangs, but in Gartner ...
SOC 2 Controls: Access Removal for Terminated or Transferred Users – An Updated Guide

SOC 2 Controls: Access Removal for Terminated or Transferred Users – An Updated Guide

| | Blog, HR, IT, SOC 2 Compliance, SOC 2 Controls
Controls are the foundations of your SOC 2 compliance efforts. They define how your business executes its policies, drive operations and meet SOC 2 compliance requirements. When policies and controls are tightly ...

Strategies for Human Resources and Security to Work as One to Enhance Workplace Safety

Oftentimes, a troubling incident can be a catalyst to spur necessary change. Melissa Muir, a Human Resources (HR) specialist dedicated to closing the gap between security and HR, realized this over a ...