How many more times will some struggling organization announce that a cyber-breach or data leak was caused by failure at a 3rd-party contractor?
Throughout the business world, security breaches have become a constant reminder of the critical need to assess and take action on cybersecurity risks and critical infrastructure vulnerabilities. As we have seen from the damages incurred from the war in Ukraine, it has occurred to many businesses and municipalities around the world that they could be…
Start building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability with this free excerpt from the groundbreaking book Building an Effective Cybersecurity Program, by Tari Schreider
What specifically can organisations do to help minimize the risk of a cybersecurity crisis?
This free chapter is an introduction to cybersecurity law from Tari Schreider's new book Cybersecurity Law, Standards and Regulations (2nd Edition)
In today’s litigious business world, cyber-related matters could land you in court. As a computer security professional, you are protecting your data, but are you protecting your company? While you know industry standards and regulations,…
Cyber-Crises Are Never "Just an IT Problem"
by Tony Jaques PhD, Director of Issue Outcomes Pty Ltd, for people who work in issue and crisis management, author of Crisis Counsel: Navigating Legal and Communication Conflict.
Online data failures and ransomware attacks are emerging as a leading deadly threat to reputation. However, some organisations still seem to…
ASIS International, the world’s largest association for security management professionals, today announced that Critical Infrastructure Risk Assessment: The Definitive Threat Identification and Threat Reduction Handbook by Ernie Hayden, PSP (Rothstein Publishing) was selected as its 2021 ASIS Security Industry Book of the Year.
This free excerpt from the new book Building an Effective Cybersecurity Program, 2nd Edition, by Tari Schreider C|CISO, CRISC, ITIL® Foundation, MCRP, SSCP will help you to begin Building YOUR Cyber Threat, Vulnerability Detection, and Intelligence Capability.
This chapter will help you to:
Understand the relationship between threats and vulnerabilities.
Understand how to identify and…
“The irony of credential stuffing is that organisations that have not suffered a direct data breach often become indirect victims when their users’ accounts are compromised due to someone else’s data breach”
What’s new in INFORMATION SECURITY POLICIES MADE EASY Version 14?
– Security Policy Library Update for the Common Policy Library (CPL)
– Updated Security Policy Mappings
– 39 Updated “Ready-to-Go” Sample Security Policy Templates
– Additional New Compliance Documents
– 60+ New Information Security Policies