Cybersecurity

  • 2019 Cybersecurity Women On Capitol Hill Public/Private Symposium

    2019 Cybersecurity Women On Capitol Hill Public/Private Symposium

    I didn’t hesitate to accept when Schellman & Company asked if I would represent our team at the Executive Women’s Forum (EWF) Third Annual Cybersecurity Women on Capitol Hill...

    Read Article
  • EU Cybersecurity Act: What you need to know

    EU Cybersecurity Act: What you need to know

    What is it? The EU Cybersecurity Act is the fruit of an initiative started by the European Parliament in 2017 with the goals of permanently establishing an agency to address...

    Read Article
  • NYDFS: Two Years Later, Let’s Check-In

    NYDFS: Two Years Later, Let’s Check-In

    Last month marked two years since the New York Department of Financial Services (NYDFS) cybersecurity requirements went into effect, so what exactly has been happening during that...

    Read Article
  • Supply Chain Software Poses Security Risks

    Supply Chain Software Poses Security Risks

    Poor internal security procedures and a lack of compliance protocols -- especially for small suppliers -- can introduce cybersecurity threats into global supply chains.

    Read Article
  • Tips for Preventing Supply Chain Attacks

    Tips for Preventing Supply Chain Attacks

    Defining your company's security requirements and having a cyber-risk management program to evaluate third-party services can reduce the risk of attacks on supply chain software....

    Read Article
  • SOC for Cybersecurity

    SOC for Cybersecurity

    Read Flipbook
  • Cybersecurity and Compliance Trends for 201952:49

    Cybersecurity and Compliance Trends for 2019

    Watch Video
  • SOC it to Cybersecurity

    SOC it to Cybersecurity

    The fight against cyber threats is one that requires much more preparation that it may have in the past. Today, threats and attacks are disrupting business operations and unnerving...

    Read Article
  • What Will the Biggest Cybersecurity Risk Be in 2019?

    What Will the Biggest Cybersecurity Risk Be in 2019?

    The cybersecurity risk landscape is constantly evolving, and regulations like GDPR are making it even more crucial for organizations to protect their customers' and users' privacy. By...

    Read Article
  • NIST CSF 2018

    NIST CSF 2018

    The 2018 National Institute of Standards and Technology (NIST) Cyber Security Framework is an updated version of the first version published in 2014. Notably, the two versions of the...

    Read Article
  • What to Expect in 2018: Cybersecurity & Compliance47:36

    What to Expect in 2018: Cybersecurity & Compliance

    Watch Video
  • New York Department of Financial Services Cybersecurity: Are You On Track?

    New York Department of Financial Services Cybersecurity: Are You On Track?

    On March 1, 2017, New York Department of Financial Services (NYDFS) released their cybersecurity requirements for financial services companies and their third-party providers.  Whether...

    Read Article
  • Cybersecurity and The Regulations That Come with It

    Cybersecurity and The Regulations That Come with It

    In the information technology world, there are currently few buzzwords as popular as the term cybersecurity. As CIOs and VPs evaluate the status of their network environment...

    Read Article
  • SOC, Meet Cybersecurity

    SOC, Meet Cybersecurity

    As global cyberattacks become more common, organizations are fine tuning, or even implementing, a cybersecurity risk management program

    Read Article
  • Demystifying the Cyber NISTs56:10

    Demystifying the Cyber NISTs

    Watch Video
  • The Whys and Wherefores of Innovation in the World of Cybersecurity

    The Whys and Wherefores of Innovation in the World of Cybersecurity

    Here we are in 2017, and it seems as if there is at least one new security firm filing papers in Delaware almost every day. Cybersecurity is a hot topic, with security threats and...

    Read Article
  • The Whys and Wherefores of Innovation in the World of Cybersecurity

    The Whys and Wherefores of Innovation in the World of Cybersecurity

    Here we are in 2017, and it seems as if there is at least one new security firm filing papers in Delaware almost every day. Cybersecurity is a hot topic, with security threats and...

    Read Article
  • How to Effectively Communicate Cybersecurity Needs to a Healthcare Board

    How to Effectively Communicate Cybersecurity Needs to a Healthcare Board

    In 2015 alone, 112 million healthcare records were compromised. If there’s one thing we can count on in the years to come, it would be increasingly sophisticated cybersecurity attacks that...

    Read Article
  • Your Company and the New Cybersecurity Act of 2015

    Your Company and the New Cybersecurity Act of 2015

    It may have slipped by you, but on December 18, 2015, Congress passed the Cybersecurity Information Sharing Act of 2015. You may have missed it because it was attached as a 14th rider to the...

    Read Article
  • What You Need to Know About HITRUST's Cyber Threat Xchange Report

    What You Need to Know About HITRUST's Cyber Threat Xchange Report

    The Health Information Trust Alliance (HITRUST) performed a thorough review of the healthcare industry’s leading threat intelligence sharing and analysis group, the HITRUST Cyber Threat XChange...

    Read Article
  • loading
    Loading More...