CISO, vCISO, Security Program

The Board vs. Security & Privacy Programs

In a corporation, the board is ultimately accountable to the shareholders for managing risks, including cybersecurity and privacy risk. Therefore, the need to address cybersecurity and privacy risk is generally accepted. However, there is often a lack of clarity over the lines

Read More

CISO, vCISO, Security Program

Finding Peace of Mind in Cybersecurity

Everyone is aware Cybersecurity is a necessity. And regardless of how mature or lacking your current cybersecurity program is, the constantly changing landscape makes it challenging to stay on top of. From potential concerns related to an economic

Read More

Security Program, Privacy

Three Essential Elements of an Adaptable Risk-Based Privacy Program

Given the complexity and cost of security, privacy and compliance efforts, a comprehensive risk management program is the best overall approach. A combined program helps reduce duplicate efforts and optimizes the ability to adapt to changes.

Read More

Security Program, HITRUST

Is HITRUST just for Healthcare or Everybody?

The Health Information Trust Alliance (HITRUST) Common Security Framework (CSF) is a widely recognized security framework that HITRUST developed in 2007 to provide a roadmap to compliance for programs like ISO/IEC 27001 and HIPAA. HITRUST CSF

Read More

Penetration Testing, Security Program

The Top Five Criteria for Selecting Your Penetration Testing Vendor

According to the hacker news October 2022, researchers reported that organizations using Office 365 Message Encryption (OME),considered obsolete legacy technology by Microsoft, are subject to a vulnerability thatwould allow rouge third parties to

Read More

Security Program, Privacy

Security is the Foundation for Building an Adaptable, Future-Proof Privacy Program

Privacy regulations boil down to protecting information. In other words, privacy is about the security of data. In today’s data-driven economy, your organization’s data is often its most valuable asset. You may be subject to multiple jurisdictions

Read More

SOC2, CISO, vCISO, Security Program

The Three Levels of HITRUST CSF r2 Compliance

The Health Information Trust Alliance (HITRUST) Common Security Framework (CSF) is a widely recognized security framework that HITRUST developed in 2007 to provide a roadmap to compliance for programs like ISO/IEC 27001 and HIPAA. HITRUST CSF

Read More

SOC2, CISO, vCISO, Security Program

Video | The Compliance Equals Security Disconnect

Topic: The Compliance Equals Security Disconnect “Use the tools at your disposal correctly, stay current on threats, monitor your security posture, and live a long, prosperous, secure life." A discussion between Sean Costigan, Prof, George C.

Read More

SOC2, CISO, vCISO, Security Program

Security Risk Assessments & Why Compliance Equals Security

You likely need a risk assessment for compliance. PCI DSS 4.0, SOC2, ISO 27001, NIST, HIPAA, and other standards require a risk assessment as a fundamental part of a robust security program— and they're right to make this fundamental analysis a

Read More

CISO, vCISO, Security Program, Risk Assessment, ISO27001

Three Steps to ISO 27001 Compliance

ISO27001 is the certifiable ISO standard that describes how to manage an Information Security Management System (ISMS) securely. 27001 is compatible with other standards and regulations, including SOX, GLBA and other cybersecurity regulations.

Read More