Cybersecurity

  • A Guide to SWIFT Cybersecurity Assessments

    A Guide to SWIFT Cybersecurity Assessments

    Read Flipbook





  • Now Providing C5 Examinations

    Learn about C5
  • Regulatory Landscape Shift: Successful Leaders Take Notice

    Regulatory Landscape Shift: Successful Leaders Take Notice

    Schellman watches closely for the outcome of the first significant enforcement action by the NYDFS under 23 NYCRR Part 500.

    Read Article
  • EnergyTech Insights (Part 2): Cybersecurity Risk Management in the Energy Services World

    EnergyTech Insights (Part 2): Cybersecurity Risk Management in the Energy Services World

    In Part 2 of our EnergyTech series, Schellman's Grayson Taylor discusses the proactive approaches energy services entities (ESEs) are taking to manage cybersecurity risk and data protection.

    Read Article
  • EnergyTech Insights Update: New Mapping of CIP to NIST CSF

    EnergyTech Insights Update: New Mapping of CIP to NIST CSF

    Schellman's Grayson Taylor shares an overview of the new mapping of NERC CIP Reliability Standards to NIST Cybersecurity Framework CSF

    Read Article
  • EnergyTech Insights (Part 1): Partly Cloudy

    EnergyTech Insights (Part 1): Partly Cloudy

    Cyber-attacks are increasing in frequency and magnitude, and the utilities sector is not immune. In part 1 of our EnergyTech series, we explore how the industry could benefit from cloud computing.

    Read Article
  • Current Cyber Threats50:35

    Current Cyber Threats

    Watch Video
  • Mid-Year Cybersecurity Compliance Update47:48

    Mid-Year Cybersecurity Compliance Update

    Watch Video
  • What is C5?

    What is C5?

    Need a comprehensive cloud computing control framework? Meet C5.

    Read Article
  • Panicked About CMMC? Don't be!

    Panicked About CMMC? Don't be!

    The Cybersecurity Maturity Model Certification (CMMC) has been a hot topic in the federal and defense contracting sector leading up to and since its formal release with v1.0 on January 31, 2020.

    Read Article
  • Safety and Cybersecurity First

    Safety and Cybersecurity First

    Three Steps to Ensure Employee Safety during a Pandemic

    Read Article
  • Locking up the 'internet of things'

    Locking up the 'internet of things'

    A wide range of internet of things connected devices are now required to include reasonable and appropriate cybersecurity measures under a California law that went into effect Jan 1.

    Read Article
  • Home Safe: 20 Cybersecurity Tips for Your Remote Workers

    Home Safe: 20 Cybersecurity Tips for Your Remote Workers

    Dark Reading recently asked a number of security experts for the most important advice they'd tell IT departments to impart to their remote workers.

    Read Article
  • Artificial Intelligence: A relative reality

    Artificial Intelligence: A relative reality

    To differentiate what is marketing jargon from what CISOs can do with AI-enhanced products, security leaders were interviewed to find out which products embedded with AI deliver on their promises.

    Read Article
  • A Spooky Tale of Cybersecurity

    A Spooky Tale of Cybersecurity

    When it comes to cybersecurity, it’s the things we don’t know that can be the scariest.

    Read Article, If You Dare
  • The Age of Coordinated Ransomware – What Is It, What Can You Do?

    The Age of Coordinated Ransomware – What Is It, What Can You Do?

    Though ransomware attacks aren’t a recent phenomenon, they seem to be increasing in frequency and intensity. If society has grown used to these kinds of cyberattacks, that’s about to change.

    Read Article
  • 2019 Cybersecurity Women On Capitol Hill Public/Private Symposium

    2019 Cybersecurity Women On Capitol Hill Public/Private Symposium

    I didn’t hesitate to accept when Schellman & Company asked if I would represent our team at the Executive Women’s Forum (EWF) Third Annual Cybersecurity Women on Capitol Hill...

    Read Article
  • EU Cybersecurity Act: What you need to know

    EU Cybersecurity Act: What you need to know

    What is it? The EU Cybersecurity Act is the fruit of an initiative started by the European Parliament in 2017 with the goals of permanently establishing an agency to address...

    Read Article
  • NYDFS: Two Years Later, Let’s Check-In

    NYDFS: Two Years Later, Let’s Check-In

    Last month marked two years since the New York Department of Financial Services (NYDFS) cybersecurity requirements went into effect, so what exactly has been happening during that...

    Read Article
  • Supply Chain Software Poses Security Risks

    Supply Chain Software Poses Security Risks

    Poor internal security procedures and a lack of compliance protocols -- especially for small suppliers -- can introduce cybersecurity threats into global supply chains.

    Read Article
  • Tips for Preventing Supply Chain Attacks

    Tips for Preventing Supply Chain Attacks

    Defining your company's security requirements and having a cyber-risk management program to evaluate third-party services can reduce the risk of attacks on supply chain software....

    Read Article
  • loading
    Loading More...