Security Program

Building a Healthy Security Culture: Insights from Kai Roer
In this episode we speak with Kai Roer, a renowned author, security culture coach, and CEO of Praxis Security Labs. Kai shares his career journey in cybersecurity and emphasizes the importance of ...

Considerations for merging your IT and OT environments into ICS
Many organizations straddle the barrier between two different worlds: the Operational Technology (OT) world of physical machinery, manufacturing systems, SCADA, […] ...

Risk Assessment: The Crucial Element Of A Successful Security Implementation Program
The advancement of technology leaves no scope for negligence when it comes to data protection. Organizations, understanding the urgency of the matter, implement sturdy cybersecurity practices in place, but can the appropriate ...

The Business Value of the Social-Engineer Phishing Service
Phishing attacks continue to plague organizations across the globe with great success, but why? Cybercriminals are targeting the human element of organizations. Additionally, they are developing techniques to use an ...

Top 5 Tactical Steps for a New CISO
A CISO must get a strategic and tactical bearing on their new role, company and the security program they are inheriting, leading and developing. This article will focus on the tactical priorities ...

Is Leadership Paying Attention to Your Security?
What do successful cybersecurity programs have in common? According to new research from Deloitte and the Financial Services Information Sharing and Analysis Center (FS-ISAC), they have the attention of executive and board ...

Insurance Occurrence Assurance?
The best way to maintain a defensible security posture is to have an information security program that is current, robust, and measurable. An effective information security program will provide far more protection ...
CISO toolbox: The tools every CISO should know
Like in every profession, good tools are already half the work. The other half however, is getting the right tool, at the right moment and using it, correct, in the right way ...
Big data analytics = Big security
In the last years big data has become a hot subject in the field of information technology and gaining more attention from our senior management. Companies are working on this “new” concept ...
How to implement security metrics
Assets are the most important pieces to an organization. Protecting them is crucial to maintain the value of these assets. But what about assigning a value to the protection measures? By means ...