How to Conduct a Gap Assessment (With Template)

How to Conduct a Gap Assessment (With Template)

| | Blog Posts, risk management
When it comes to governance, risk, and compliance (GRC), do you know exactly where your weaknesses are? For any organization that adheres to complex GRC standards, it’s impossible to keep it all ...
Leveraging Tabletop exercises to Enhance OT security maturity

Leveraging Tabletop exercises to Enhance OT security maturity

| | CISO, Incident Response, iot, OT, threats
Has your organization tested its OT security incident response plan in the last 6 months? Do you remember when you last checked your institutional OT security awareness levels? Are your OT security ...
How to Reduce Risk From Developer Permissions Sprawl

How to Reduce Risk From Developer Permissions Sprawl

Get steps to prevent risky permissions sprawl in your SDLC.  ...
PCI DSS Self-Assessment Questionnaires: Choosing the Right Type

PCI DSS Self-Assessment Questionnaires: Choosing the Right Type

If you process credit card payments, you need to prioritize security. One way to guarantee this safety is by complying with Payment Card Industry (PCI) Data Security Standards (DSS) ...
Cybersecurity Insights with Contrast CISO David Lindner | 10/25/24

Cybersecurity Insights with Contrast CISO David Lindner | 10/25/24

Insight #1:  Chuck the checkbox, seize real risk To achieve a strong security posture, CISOs must avoid a "checkbox mentality" that prioritizes compliance over actual risk management and instead cultivate a security ...
Iams, IAM strategy, security, strategy, CISOs, IAM identity access management GDPR Affects IAM Usage

CISOs Should Be Directing IAM Strategy — Here’s Why 

By placing IAM strategy and enforcement under the CISO’s purview, enterprises can ensure that it is treated as a critical component of the overall security strategy ...
Security Boulevard
How to Reduce Risk From Misconfigured Build Assets

How to Reduce Risk From Misconfigured Build Assets

| | AppSec, Best Practices, CISO, DEVOPS
Get steps to prevent risky misconfigurations in your SDLC.  ...
SEC is Not Accepting Half-Truths

SEC is Not Accepting Half-Truths

| | CISO, Cybersecurity, SEC
 The SEC has fined four major companies for materially misleading investors regarding cyberattacks.Tech in TroubleRegulatory actions have been brought against Unisys, Avaya, Check Point, and Mimecast for their purposeful decisions to not clearly ...
How to evaluate OT security program maturity

How to evaluate OT security program maturity

| | CISO, Incident Response, iot, OT, threats
An OT security program can lead to better resource use, improved security operations, and tangible gains for the security posture of an OT operator. The benefits of running an OT security program ...
A Detailed Guide to Achieving ISO 27001 Certification

ISO 27001 Certification: A Detailed Guide on How to Get Certified

Editor’s note: This blog post is an excerpt from our eBook, Getting to Know the ISO 27001 Standard: Practical Guidance for Achieving ISO 27001 Certification. ISO/IEC 27001 is an information security standard ...