Remove CISO Remove Cyber Risk Remove Digital transformation Remove Risk
article thumbnail

How to find, fund and fix cyber risk blind spots

SC Magazine

Today’s columnist, Sean McDermott of RedMonocle, says that companies should use the NIST 800-53 security and privacy controls to help find cyber risk blind spots. The rapid, overnight shift exposed new cyber risk blind spots and gaps unknown to security leaders or executive teams. Credit: NIST.

article thumbnail

Episode 179: CISO Eye on the Virus Guy – Assessing COVID’s Cyber Risks

The Security Ledger

In this episode of the podcast (#179), CISO Kayne McGlandry of IEEE joins us to talk about the cyber risks posed by COVID and why COVID-themed phishing emails shouldn’t be your only concern. Also: SMBs Struggle with Identity Spotlight Podcast: How DU Telecom Manages Digital Transformation Risk.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: CyberGRX seeks to streamline morass of third-party cyber risk assessments

The Last Watchdog

So they began inundating their third-party suppliers with “bespoke assessments” – customized cyber risk audits that were time consuming and redundant. Kneip also painted the wider context about why effective third-party cyber risk management is an essential ingredient to baking-in security at a foundational level.

article thumbnail

How the CISO has adapted to protect the hybrid workforce

IT Security Guru

Given the connectivity needs of a remote workforce – and knowing a hybrid workforce is here to stay – many IT teams have had to make sudden changes in the way workers connect to corporate systems that could introduce new cyber risks and vulnerabilities. . Cloud dominance . Security landscape requires adaptation .

CISO 97
article thumbnail

RSAC insights: How ‘TPRM’ can help shrink security skills gap — while protecting supply chains

The Last Watchdog

Third-Party Risk Management ( TPRM ) has been around since the mid-1990s – and has become something of an auditing nightmare. Related: A call to share risk assessments. This is because third-party risk has become a huge problem for enterprises in the digital age. Cyber risks profiling. based CyberGRX.

article thumbnail

Spotlight Podcast: QOMPLX CISO Andy Jaquith on COVID, Ransomware and Resilience

The Security Ledger

In this Spotlight podcast* we’re joined by Andrew Jaquith, the CISO at QOMPLX to talk about how the COVID pandemic is highlighting longstanding problems with cyber risk management and cyber resilience. Episode 107: What’s Hot at Black Hat & does DHS need its new Risk Management Center? What’s to be done?

CISO 52
article thumbnail

NEW TECH: Devolutions’ ‘PAM’ solution helps SMBs deal with rising authentication risks

The Last Watchdog

Related : SMBs are ill-equipped to deal with cyber threats Without a cohesive cybersecurity framework, SMBs are falling further behind as digital transformation, or DX, ramps up. Embracing digital transformation becomes even more of a challenge without a dedicated platform to address vulnerabilities.