Business security leaders must understand the importance of their role in organizational resilience. To stay relevant and succeed in times of rapid change and increasing uncertainty, businesses can leverage digitization to manage risk and become more adaptable.
The Cybersecurity and Infrastructure Security Agency (CISA) has issued best practices around nine cybersecurity goals for control systems in response to the 2021 Presidential Memorandum. Let’s unpack what’s involved in the CISA guidelines, who should be paying attention, and the steps your company may need to take now.
A new book focuses on risk management for enterprise security leaders. The publication, titled "Flip This Risk for Enterprise Security: Industry Experts Share Their Insights About Enterprise Security Management Risks for Organizations," discusses compliance, executive protection, travel security and more top-of-mind issues.
Cyberattacks are distinct from other types of corporate crises, especially in how, when and why an organization communicates with its stakeholders during and in the aftermath of an attack. Here are five questions boards should ask the C-suite before a cyberattack occurs.
Heath Anderson, Director of Information Security and Technology at LogicGate, discusses how to build business and operational resiliency with a governance, risk management and compliance (GRC) program.
As a more encompassing and modern approach that extends not only governance, risk and compliance capabilities but also Integrated Risk Management and Enterprise Risk Management, digital risk management provides new tools and techniques risk professionals can interweave into operations and technology with unprecedented detail to strengthening the enterprise.
Steve Grewal, Cohesity Federal CTO and former U.S. Department of Education CISO/CTO/CIO, shares his insights into how organizations can leverage modern data management strategies and technologies to ensure they are prepared to reduce the impact of ransomware attacks while being ready for audit and reporting processes to remain compliant with increasing state-by-state regulations.
When an employee or security can rapidly and effectively incapacitate and control a potentially violent subject without physical contact and without any effect on bystanders or lasting harm to the subject, virtually all potential catalysts of injury from violence are effectively eliminated.