From the Spring 2022 Issue

7 Key Questions That Gauge the Effectiveness of Present and Future Cybersecurity Programs

Author(s):

Amit Kandpal, Director, Customer Success, Netskope

It is no secret that a well-defined, tested and implemented cybersecurity program is an essential function for the stability of business operations; however, there are many variables to consider. Rapid advances in technology have changed the dynamics of informed decision-making with the best option often being to introduce a newer technology into the market, rather … Read more

From the Spring 2022 Issue

Shifting Our Thinking from Cybersecurity to Cyber Safety

Author(s):

Stephen Cardot, CEO, President, Founder, CloudCover

Our reactive, defensive approach to IT security isn’t working − proactive de-risking is the way forward. “Disconcertingly routine.” That’s how an article in a national news publication summed up the current cyber-attack landscape after the recent discovery that Chinese hackers had breached several governments and universities around the world in a years-long campaign to steal … Read more

From the Spring 2022 Issue

Comply with Cyber Insurance Requirements and Save: Focus on Your Company’s Risk Profile

Author(s):

François Amigorena, Founder and CEO, IS Decisions

It isn’t a matter of if, but when your organization will come against a cybersecurity threat. And more organizations are seeking cyber insurance to mitigate eventual costs. But with both cyber insurance premiums and the risk of cyber-attacks on the rise, cyber insurance is set to become even more expensive or limited in scope, or … Read more

From the Winter 2022 Issue

Blurred Lines of Working From Home

Author(s):

Adam McCullough, Senior Cloud Solution Architect, Microsoft

The New Normal Working from Home (WFH) has been around for a long time. It wasn’t readily available to everyone and there were always whispers of “working from home” and what the employer thought it meant. Companies didn’t trust their employees if they couldn’t see them. You were often judged by the number of hours … Read more

From the Winter 2022 Issue

A Comprehensive Approach to Sustain and Secure a Remote Workforce Strategy in 2022

Author(s):

Glenn Axelrod, M.S, CISA, CISM, CRISC, HKA Technology Solutions, L.L.C.

WHY ASKING EMPLOYEES TO RETURN TO THE OFFICE IS MISSING THE MARK (AND HOW YOU CAN FIX IT) Neglecting to implement or continue a remote work option and reap its benefits can result in employees leaving an organization, possibly working for a competitor who does implement one. “If you do not allow flexible or remote … Read more

From the Winter 2022 Issue

Tapping into the Crowd: User Verification Using Social Media

Author(s):

Gergo Varga, Senior Content Manager/ Evangelist, SEON

The need for user verification to prevent fraud and protect your company from cybercrime is increasingly being understood as urgent.  Certain sectors, including eCommerce, banking and FinTech, recognized early on the importance of knowing exactly what company it is and who it is that wants to become a customer/client of theirs. Some local and regional … Read more

From the Winter 2022 Issue

What is PtaaS?

Author(s):

Caroline Wong, Chief Strategy Officer, Cobalt

What is PtaaS

Ransomware and other digital attacks continue to grow in frequency for companies around the world. With this, demand for cybersecurity services continues to grow as well. Services high in demand include professional services, pentesting, managed detection response, and more. It is, therefore, crucial to understand the innovation currently taking place in the cybersecurity sector. These … Read more

From the Winter 2022 Issue

Two Fundamentals That Help You Make Great Decisions for Industrial Cybersecurity

Author(s):

Felipe Sabino Costa, LATAM Industrial Cybersecurity (IACS) Expert, Moxa

Effective cybersecurity management is imperative for all organizations. There are many standards and guidelines available for organizations to refer to in order to move forward. In this article, we will introduce specific action items based on well-defined frameworks and standards when building a Cybersecurity Management System (CSMS) for your own Industrial Control System (ICS). Taking a Defense-in-Depth (DiD) approach to network construction and choosing secure-by-design solutions from trusted vendors can help simplify the ICS cybersecurity decision-making process.

From the Winter 2022 Issue

Stop Being Cyber Stupid

Author(s):

Mike Shelah, Business Performance Advisor, Insperity

It is not a huge revelation, when they say hacks and ransomware have gone through the roof since July of 2020. Cyber-attacks are impacting every business, in every industry. Just because you weren’t hacked does not mean it did not have a ripple effect on you. The Target breach that occurred a few years ago … Read more

From the Winter 2022 Issue

Countering New Cyber Vulnerabilities Being Faced by Remote Workers

Author(s):

Dr. Bill Anderson, President, CIS Mobile

Before “COVID” became part of our daily lexicon, only seven percent of U.S. workers had access to a flexible workplace or telework, according to a report by the Pew Research Center. Today, all of that has changed. Nearly half of the American workforce is working remotely – a trend most employers expect will continue and … Read more