Remove Cyber Risk Remove Event Remove Firewall Remove Information Security
article thumbnail

Q&A: NIST’s new ‘Enterprise Risk Management’ guidelines push cyber risks to board level

The Last Watchdog

The Internet Security Alliance ( ISA ) is a trade association and think tank whose members include prominent corporations in a wide cross section of industries. In February, ISA, in partnership with the National Association of Corporate Directors ( NACD ), published the 2020 edition of their Cyber-Risk Oversight Handbook for Corporate Boards.

article thumbnail

GUEST ESSAY: As cyber risks rise in 2020, as they surely will, don’t overlook physical security

The Last Watchdog

Physical security is the protection of personnel and IT infrastructure (such as hardware, software, and data) from physical actions and events that could cause severe damage to an organization. Related: Good to know about IoT Physical security is often a second thought when it comes to information security.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to Use Your Asset Management Software to Reduce Cyber Risks

CyberSecurity Insiders

Ambiguity about cyber security threats, legal responsibilities, and unexpected events is exacerbated for IT security professionals who don’t understand where resources are positioned, how well they are handled, or whether they are susceptible. . . Respond fast to incidents via IT experts. . Conclusion.

article thumbnail

Understanding the Different Types of Audit Evidence

Centraleyes

Risk Assessments These audits identify and mitigate potential threats and vulnerabilities, ensuring organizations are well-prepared for cyber risks. Documentary Evidence: Tangible and straightforward, documentary evidence encompasses policies, procedures, and documentation related to information security controls.

Risk 52
article thumbnail

Top 5 Strategies for Vulnerability Mitigation

Centraleyes

Vulnerability management is a critical element of information security. The technology surrounding information security is developing at a rapid pace and vulnerabilities are inevitable. Using a dedicated cybersecurity risk management platform can help you to stay informed of new vulnerabilities and threats.

Risk 52
article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

Common compliance standards include GDPR, which governs data processing for EU members; PCI DSS, which guarantees safe credit card transactions; and NIST 800-53 for IT risk management. ISO 27000 is a standard for information security and SOC is for maintaining consumer data integrity and security across several dimensions.

Risk 105
article thumbnail

What’s new at BH Consulting: marking European Cybersecurity Month and more

BH Consulting

In this blog, we’re rounding up some of the main events we were involved in during European Cybersecurity Month. With many more people now working from home because of Coronavirus restrictions, they’re potentially at greater risk from security threats. October was a busy month on all fronts here at BH Consulting.