From the Summer 2023 Issue

Cybersecurity AI Liability Insurance: Safeguarding Businesses in the Digital Age

Author(s):

Dr. Rebecca Wynn, Chief Cybersecurity Strategist & CISO, Click Solutions Group

AI Liability Insurance

Cyber threats are rising in the digital era, making cybersecurity a top priority for businesses globally. As technology use and handling of sensitive data continue to be prevalent, companies must guarantee they are shielded against cyber-attacks. Cybersecurity AI Liability insurance offers the solution by providing coverage against cyber threats and liabilities. This insurance type assists … Read more

From the Fall 2021 Issue

Synthetic Identity Fraud (SIF): Combating the Phantom Menace

Author(s):

Dr. Rebecca Wynn, Chief Cybersecurity Strategist & CISO, Click Solutions Group

Synthetic Identity Fraud

The article will explain what Synthetic Identity Fraud (SIF) is; why you should care; and what to do to protect yourself/child/business. It is a high-level overview meant to be informative and educational. By the end of the reading, you will hopefully agree with this premise and these definitions. Half-Artificial and Half-Human: A Synthetic Identity (SID); … Read more

From the Spring 2021 Issue

Cybersecurity: The Danger of Comfort Zones

Author(s):

Dr. Rebecca Wynn, Chief Cybersecurity Strategist & CISO, Click Solutions Group

cybersecurity-the-danger-of-comfort-zones

The biggest danger of any organization is comfort zones. These comfort zones are seen in silos and in the culture of “we have always done things this way.” Cybersecurity, compliance, privacy, governance, and IT departments are no exception to having this danger. The emergence of new devices and software products designed to unite employees has … Read more

From the Summer 2018 Issue

The Executive Case for Active Insider Threat Management

Author(s):

Dr. Rebecca Wynn, Chief Cybersecurity Strategist & CISO, Click Solutions Group

rwynn-header

Every company will face an insider-related security incident sooner or later, regardless of whether it will be caused by a malicious action or an honest mistake. Key Considerations for Dealing with Senior Management Where The Information Security Leader Fits Within the Organization: Without the appropriate title, support and platform, success will be difficult to attain. … Read more