Using FAIR and NIST CSF for Security Risk Management

Risk management and risk assessments go hand in hand, and most organizations have completed a security assessment based on maturity models at some point in their existence. However, more companies are realizing the need to complement maturity models with a risk-based approach for assessing their cybersecurity positions. One such risk-based approach is based on the […]

The post Using FAIR and NIST CSF for Security Risk Management appeared first on Security Intelligence.

Continue reading Using FAIR and NIST CSF for Security Risk Management

Ensuring Your Security Operations Center is Ready for Operational Technology

The mission of the security operations center (SOC) has evolved over the years. Building a security operations center used to involve onboarding as many device feeds as possible. Today, it’s more about having an integrated security information and event management (SIEM) and big data platform — complemented by workflow, automation and analytical tools — with […]

The post Ensuring Your Security Operations Center is Ready for Operational Technology appeared first on Security Intelligence.

Continue reading Ensuring Your Security Operations Center is Ready for Operational Technology

Taking the Risk Out of Mergers and Acquisitions

In the post-COVID-19 economy, cyber risk and cybersecurity will play a central role in unlocking mergers and acquisitions (M&A) deal valuations. While economic uncertainty has contributed to a decline in M&A activity in the first half of 2020, many analysts expect an increase in deals during 2020-21 based on several conditions.  The Mergers and Acquisitions […]

The post Taking the Risk Out of Mergers and Acquisitions appeared first on Security Intelligence.

Continue reading Taking the Risk Out of Mergers and Acquisitions