In 2017, the Security Leadership Research Institute (the Security Executive Council’s research arm) asked security practitioners to choose from a list of which risk-related activities their security ...
Higher education institutions are in a vulnerable position when it comes to cybersecurity. In an alert issued by the FBI earlier this year, the nation’s top law enforcement agency warned that agents ...
The rise of AI services, rapid software updates and unseen third-party data flows is exposing the limits of annual vendor ...
Too many healthcare providers fail to conduct comprehensive, timely risk assessments, as required under HIPAA as well as the HITECH Act, says security consultant Kate Borten, president of The ...
There are almost as many different cybersecurity assessments as there are myths about them. It’s important to know what’s true. Let’s face it: Security assessments aren’t much fun for the team on the ...
Security is a fundamental human need. When people feel safe, they are likely to be more productive, perform better at work and school, and have overall better physical and mental well-being. Campus ...
Collects and uses customer or employee personal information. Participates in an industry sector that is considered high risk or critical infrastructure. Offers securities as a publicly traded company.
Under a recently enacted California law, local education agencies and individual schools can request that the California Military Department (CMD) conduct independent security assessments to root out ...
There is no right and wrong way to perform a Cybersecurity Risk Assessment, however, we are going through a simple route and lay down a step-by-step guide on how to assess your environment. Follow the ...
Once an institution has an idea what they want to do, an in-person site survey helps connect planning with integration and can ensure a seamless installation when the time comes. Protecting college ...