Cybersecurity

  • Does Zero Trust = Better Audits?

    Does Zero Trust = Better Audits?

    Schellman's Bryan Harper provides an overview of Zero Trust principles and implementation practices

    Read Article





  • Now Providing C5 Examinations

    Learn about C5
  • SWIFT - Reinforcing the Security of the Global Banking System

    SWIFT - Reinforcing the Security of the Global Banking System

    Read Flipbook
  • HHS Requirement for Security Practices NIST

    HHS Requirement for Security Practices NIST

    Schellman's Debbie Zaller provides an overview of the HHS issued HITECH Act amendment

    Read Article
  • Schellman First Take on the Cybersecurity Executive Order

    Schellman First Take on the Cybersecurity Executive Order

    Schellman's Doug Barbin provides a “First Take” on the new Presidential Executive Order on Improving the Nation's Cybersecurity Yesterday, on May 12th, President Biden issued the “Executive

    Read Article
  • A Guide to SWIFT Cybersecurity Assessments

    A Guide to SWIFT Cybersecurity Assessments

    Read Flipbook
  • Regulatory Landscape Shift: Successful Leaders Take Notice

    Regulatory Landscape Shift: Successful Leaders Take Notice

    Schellman watches closely for the outcome of the first significant enforcement action by the NYDFS under 23 NYCRR Part 500.

    Read Article
  • EnergyTech Insights (Part 2): Cybersecurity Risk Management in the Energy Services World

    EnergyTech Insights (Part 2): Cybersecurity Risk Management in the Energy Services World

    In Part 2 of our EnergyTech series, Schellman's Grayson Taylor discusses the proactive approaches energy services entities (ESEs) are taking to manage cybersecurity risk and data protection.

    Read Article
  • EnergyTech Insights Update: New Mapping of CIP to NIST CSF

    EnergyTech Insights Update: New Mapping of CIP to NIST CSF

    Schellman's Grayson Taylor shares an overview of the new mapping of NERC CIP Reliability Standards to NIST Cybersecurity Framework CSF

    Read Article
  • EnergyTech Insights (Part 1): Partly Cloudy

    EnergyTech Insights (Part 1): Partly Cloudy

    Cyber-attacks are increasing in frequency and magnitude, and the utilities sector is not immune. In part 1 of our EnergyTech series, we explore how the industry could benefit from cloud computing.

    Read Article
  • Current Cyber Threats50:35

    Current Cyber Threats

    Watch Video
  • Mid-Year Cybersecurity Compliance Update47:48

    Mid-Year Cybersecurity Compliance Update

    Watch Video
  • What is C5?

    What is C5?

    Need a comprehensive cloud computing control framework? Meet C5.

    Read Article
  • Panicked About CMMC? Don't be!

    Panicked About CMMC? Don't be!

    The Cybersecurity Maturity Model Certification (CMMC) has been a hot topic in the federal and defense contracting sector leading up to and since its formal release with v1.0 on January 31, 2020.

    Read Article
  • Safety and Cybersecurity First

    Safety and Cybersecurity First

    Three Steps to Ensure Employee Safety during a Pandemic

    Read Article
  • Locking up the 'internet of things'

    Locking up the 'internet of things'

    A wide range of internet of things connected devices are now required to include reasonable and appropriate cybersecurity measures under a California law that went into effect Jan 1.

    Read Article
  • Home Safe: 20 Cybersecurity Tips for Your Remote Workers

    Home Safe: 20 Cybersecurity Tips for Your Remote Workers

    Dark Reading recently asked a number of security experts for the most important advice they'd tell IT departments to impart to their remote workers.

    Read Article
  • Artificial Intelligence: A relative reality

    Artificial Intelligence: A relative reality

    To differentiate what is marketing jargon from what CISOs can do with AI-enhanced products, security leaders were interviewed to find out which products embedded with AI deliver on their promises.

    Read Article
  • A Spooky Tale of Cybersecurity

    A Spooky Tale of Cybersecurity

    When it comes to cybersecurity, it’s the things we don’t know that can be the scariest.

    Read Article, If You Dare
  • The Age of Coordinated Ransomware – What Is It, What Can You Do?

    The Age of Coordinated Ransomware – What Is It, What Can You Do?

    Though ransomware attacks aren’t a recent phenomenon, they seem to be increasing in frequency and intensity. If society has grown used to these kinds of cyberattacks, that’s about to change.

    Read Article
  • 2019 Cybersecurity Women On Capitol Hill Public/Private Symposium

    2019 Cybersecurity Women On Capitol Hill Public/Private Symposium

    I didn’t hesitate to accept when Schellman & Company asked if I would represent our team at the Executive Women’s Forum (EWF) Third Annual Cybersecurity Women on Capitol Hill...

    Read Article
  • loading
    Loading More...