The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework

Follow along with risk and compliance officer Frank Roth as he endeavors to fill in the gaps of an outdated (and incomplete) risk management framework in his new role at a utility company.

The post The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework appeared first on Security Intelligence.

Continue reading The Compliance Crisis: A Compliance Officer Faces an Outdated Risk Management Framework

10 Takeaways From the ISO 31000:2018 Risk Management Guidelines

The International Standards Organization (ISO) released an updated version of its risk management guidelines to help security leaders engage top leadership in cyber risk decision-making.

The post 10 Takeaways From the ISO 31000:2018 Risk Management Guidelines appeared first on Security Intelligence.

Continue reading 10 Takeaways From the ISO 31000:2018 Risk Management Guidelines

Using Data Protection Guidelines to Balance Security and Compliance in 2018

When organizations follow frameworks such as Gartner’s Data-Centric Audit and Protection (DCAP) guidelines, security and compliance can coexist and even complement one another.

The post Using Data Protection Guidelines to Balance Security and Compliance in 2018 appeared first on Security Intelligence.

Continue reading Using Data Protection Guidelines to Balance Security and Compliance in 2018

10 Steps to Evaluate Cloud Service Providers for FedRAMP Compliance

Companies that wish to do business with federal government agencies in the cloud must complete these 10 steps to achieve FedRAMP compliance.

The post 10 Steps to Evaluate Cloud Service Providers for FedRAMP Compliance appeared first on Security Intelligence.

Continue reading 10 Steps to Evaluate Cloud Service Providers for FedRAMP Compliance

Choosing the Right Security Framework to Fit Your Business

By adopting a hybrid security framework, organizations can cherry-pick the guidelines and compliance requirements that meet their unique business objectives.

The post Choosing the Right Security Framework to Fit Your Business appeared first on Security Intelligence.

Continue reading Choosing the Right Security Framework to Fit Your Business

BGP Internet Routing: What Are the Threats?

The rate of BGP internet routing attacks has not increased significantly in the past two years. It is a considerable threat, however, because it puts the stability of the internet at risk.

The post BGP Internet Routing: What Are the Threats? appeared first on Security Intelligence.

Continue reading BGP Internet Routing: What Are the Threats?

Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges

Organizations that follow both the COSO enterprise risk management framework and the NIST CSF can vastly improve their cyber risk oversight and management.

The post Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges appeared first on Security Intelligence.

Continue reading Understanding the COSO 2017 Enterprise Risk Management Framework, Part 2: Combining Apples With Oranges

Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction

The new COSO enterprise risk management framework offers business leaders a road map to more effectively assess, manage, review and report on cyber risks.

The post Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction appeared first on Security Intelligence.

Continue reading Understanding the COSO 2017 Enterprise Risk Management Framework, Part 1: An Introduction

Big Data Control Frameworks: Have Your Data and Control It Too

Under a strong data control framework, vendors provide exceptional analytics tools without requiring owners to relinquish total control of the data.

The post Big Data Control Frameworks: Have Your Data and Control It Too appeared first on Security Intelligence.

Continue reading Big Data Control Frameworks: Have Your Data and Control It Too

New cybersecurity report focuses on the private sector

George Washington University’s Center for Cyber and Homeland Security (CCHS), a “think and do” tank responsible for carrying out research and analysis on homeland security, counter-terrorism, and cybersecurity issues, has recently released a new report entitled “Into the Gray Zone: The Private Sector and Active Defense against Cyber Threats”.

Categories:

Tags:

(Read more…)

Continue reading New cybersecurity report focuses on the private sector