Risk Management and Assessment

June 22, 2020
STIG vs. CIS part 2: Selecting the Best Baseline for Your Business

This blog is part 2 of our multi-post blog series on STIG vs. CIS. In this second post, we’re continuing to unpack the differences...

Read More
June 22, 2020
STIG vs. CIS part 1: The Anatomy of Baselines and Compliance

This blog is part 1 of our multi-post blog series on STIG vs. CIS. In this series, we will give...

Read More
June 15, 2020
Incident Response Self-Assessment

Incidents Happen, How Prepared is Your Organization?  The nature of threats and Incident Response (IR) is an ever-changing landscape. In order to stay...

Read More
May 7, 2020
A Day in the Life of a TPRM Analyst

What it’s like to be a Third-Party Risk Management (TPRM) Analyst This month we’re interviewing Kelley Grogan, a Third-Party Risk...

Read More
April 14, 2020
Keys to A Successful Onsite Vendor Assessment for your TPRM program

How Onsite Assessments fit into your TPRM Strategy TPRM and Third-Party Vendor Assessments Third-Party Risk is a major concern for many organizations, especially...

Read More
March 12, 2020
Understand the role fourth-party vendors play in your risk profile

Don’t let attackers in through your fourth-party vendors Your third-party vendors have their own third-party vendors. Those are your fourth-party...

Read More
February 24, 2020
A Day in the life at MPG: Governance, Risk, and Compliance Manager

What it’s like to Work as a Governance, Risk, and Compliance Manager This month we’re interviewing Anita Walker, a Governance, Risk, and Compliance (GRC) Manager at MindPoint Group (MPG) and...

Read More
September 20, 2018
Insider Threat Mitigation – Just Players in a Risk Management Game

Let’s meet some actors in this game, shall we?  First, we have Roger, who is angry that his peers have...

Read More
August 15, 2018
Social Engineering Part 2: Open-Source Intelligence (OSINT)

“Most scams work because victims are successfully convinced the scam is real. Thus, victims give criminals their information more often...

Read More
June 26, 2018
Guide to Creating a Cybersecurity Challenge for Kids

By:  Stephanie Carruthers and Nolan Kennedy “Right now, we’ve got about 300,000 unfilled cybersecurity positions as a nation,” said Rick...

Read More
June 10, 2018
Inherent Risk Tiering for Third-Party Vendor Assessments

It can be a challenging and overwhelming task to adequately manage the risk associated with outsourcing technology or business processes,...

Read More
November 24, 2016
Stop By Booth 118 @ AWS re:Invent and Speak to Our Team of Cybersecurity Experts

Read More
12