risk management

Don’t Lock Up Peanut Butter in Fort Knox: The Smart Approach to Data Classification
Greg Neville | | Cybersecurity, Data Classification, data disposal, data handling, Data Security, IT Security, risk management
Exploring the implementation of a data classification model in order to enable a data-driven approach to managing risk and cost ...
Security Boulevard

Cybersecurity Insights with Contrast CISO David Lindner | 04/18/25
David Lindner, Director, Application Security | | Board buy-in, Business risks, CVE Program, cyber insurance policy, risk management, ROI of security, security strategy, Single point of failure
Insight No. 1 — CVE program’s near-death exposes security's single point of failure The recent near-halt of the CVE program due to funding issues highlights a critical vulnerability in our industry's reliance ...

How effective security awareness training elevates cybersecurity in your organization
Cybersecurity has become a paramount concern for organizations across all sectors in the rapidly evolving digital landscape. As technology leaders, we recognize that while technological defenses are crucial, the human element often ...
Navigating third-party risk assessments in a changing business landscape
In today’s interconnected business environment, organizations increasingly rely on third-party vendors to enhance operational efficiency and drive innovation. For instance, consider a mid-sized retail company that partnered with a logistics provider to ...
From checkbox to confidence: Why passing the audit isn’t the endgame
“We passed the audit. No idea how, but we passed.” If that sentence sounds familiar – or worse, relatable – it’s time for a serious look in the mirror. Every year, companies ...

Aligning Cybersecurity and Third-Party Risk Management with Business Goals
Will Klotz | | Blog, Cybersecurity, Governance, Risk & Compliance, GRC, risk management, Security Awareness & Education
In the cybersecurity risk world, we often encounter the issue of not speaking the same language as the business. This […] ...

From Spreadsheets to Solutions: How PlexTrac Enhances Security Workflows
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In this special episode of the Shared Security Podcast, join Tom Eston and Dan DeCloss, CTO and founder of PlexTrac, as they discuss the challenges of data overload in vulnerability remediation. Discover ...
ISO 31000 vs. COSO ERM frameworks – Navigating the risk landscape
In an era where uncertainty is the norm, strong risk management isn’t just good practice – it’s a competitive advantage. For technology leaders steering organizations through complex challenges, two frameworks consistently rise ...

CaaS: The Key to More Affordable Cyber Insurance
Tim Golden | | CaaS, Cyber compliance, cyber insurance, Cyber Threats, MSP Cybersecurity, risk management, Security frameworks, Underwriting standards
Compliance as a Service (CaaS) strengthens a company’s posture and defensibility, making it more attractive to insurers ...
Security Boulevard

Tackling Data Overload: Strategies for Effective Vulnerability Remediation
Tom Eston | | AI, Automation in Security, cyber defense, Cyber Security, cyber threat, Cybersecurity, Cybersecurity Strategy, Data Consolidation, Data Overload, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, IT Security Collaboration, Managing Cybersecurity Data, Penetration Testing, PlexTrac, Podcast, Podcasts, Privacy, purple teaming, Red Teaming, risk management, risk scoring, security, security best practices, technology, Threat Intelligence, Vulnerability Remediation, Weekly Edition
In part one of our three part series with PlexTrac, we address the challenges of data overload in vulnerability remediation. Tom hosts Dahvid Schloss, co-founder and course creator at Emulated Criminals, and ...