Learn about C5
Now Providing C5 Examinations
Other content in this Stream
Schellman watches closely for the outcome of the first significant enforcement action by the NYDFS under 23 NYCRR Part 500.
In Part 2 of our EnergyTech series, Schellman's Grayson Taylor discusses the proactive approaches energy services entities (ESEs) are taking to manage cybersecurity risk and data protection.
Schellman's Grayson Taylor shares an overview of the new mapping of NERC CIP Reliability Standards to NIST Cybersecurity Framework CSF
Cyber-attacks are increasing in frequency and magnitude, and the utilities sector is not immune. In part 1 of our EnergyTech series, we explore how the industry could benefit from cloud computing.
Need a comprehensive cloud computing control framework? Meet C5.
The Cybersecurity Maturity Model Certification (CMMC) has been a hot topic in the federal and defense contracting sector leading up to and since its formal release with v1.0 on January 31, 2020.
Three Steps to Ensure Employee Safety during a Pandemic
A wide range of internet of things connected devices are now required to include reasonable and appropriate cybersecurity measures under a California law that went into effect Jan 1.
Dark Reading recently asked a number of security experts for the most important advice they'd tell IT departments to impart to their remote workers.
To differentiate what is marketing jargon from what CISOs can do with AI-enhanced products, security leaders were interviewed to find out which products embedded with AI deliver on their promises.
When it comes to cybersecurity, it’s the things we don’t know that can be the scariest.
Though ransomware attacks aren’t a recent phenomenon, they seem to be increasing in frequency and intensity. If society has grown used to these kinds of cyberattacks, that’s about to change.
I didn’t hesitate to accept when Schellman & Company asked if I would represent our team at the Executive Women’s Forum (EWF) Third Annual Cybersecurity Women on Capitol Hill...
What is it? The EU Cybersecurity Act is the fruit of an initiative started by the European Parliament in 2017 with the goals of permanently establishing an agency to address...
Last month marked two years since the New York Department of Financial Services (NYDFS) cybersecurity requirements went into effect, so what exactly has been happening during that...
Poor internal security procedures and a lack of compliance protocols -- especially for small suppliers -- can introduce cybersecurity threats into global supply chains.
Defining your company's security requirements and having a cyber-risk management program to evaluate third-party services can reduce the risk of attacks on supply chain software....