Start building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability with this free excerpt from the groundbreaking book Building an Effective Cybersecurity Program, by Tari Schreider
Where would all the nation’s critical infrastructure be if we didn’t have a reliable electric grid? How would your business survive?
The world can be a scary place for your business … and cyber threats can be even scarier these days. When hostile state actors and increasingly dangerous corporate espionage are worrying you, you need to focus your energy on cyber threat detection, prevention and response!
This free excerpt from the groundbreaking book Building an Effective Cybersecurity Program…
Charlie Maclean-Bristol discusses the evidence behind cyber attacks indirectly causing the death and injury of people, and the importance of exercises to train employees on working efficiently during a cyber attack.
What specifically can organisations do to help minimize the risk of a cybersecurity crisis?
Rachelle Loyear, Tim McCreight, CPP, John Petruzzi, CPP and David Feeney, CPP discussed Enterprise Security Risk Management (ESRM) and digital transformation
Critical Infrastructure at Risk from Operational Technologies and IOT Vulnerabilities
by Ernie Hayden CISSP GICSP(Gold) PSP
In a recent article, Skybox Technology raised concerns resulting in the above headline. Even in a Kaspersky news release, Internet of Things (IoT) cyberattacks have more than doubled during the first half of 2021. Kaspersky also noted that from…
Cyber-Crises Are Never "Just an IT Problem"
by Tony Jaques PhD, Director of Issue Outcomes Pty Ltd, for people who work in issue and crisis management, author of Crisis Counsel: Navigating Legal and Communication Conflict.
Online data failures and ransomware attacks are emerging as a leading deadly threat to reputation. However, some organisations still seem to…
This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability.
This chapter will help you to:
Understand the relationship between threats and vulnerabilities.
Understand how to identify and…
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14?
– Security Policy Library Update for the Common Policy Library (CPL)
– Updated Security Policy Mappings
– 39 Updated “Ready-to-Go” Sample Security Policy Templates
– Additional New Compliance Documents
– 60+ New Information Security Policies