CISO Suite

How to Conduct a Gap Assessment (With Template)
When it comes to governance, risk, and compliance (GRC), do you know exactly where your weaknesses are? For any organization that adheres to complex GRC standards, it’s impossible to keep it all ...

Leveraging Tabletop exercises to Enhance OT security maturity
Has your organization tested its OT security incident response plan in the last 6 months? Do you remember when you last checked your institutional OT security awareness levels? Are your OT security ...

How to Reduce Risk From Developer Permissions Sprawl
Get steps to prevent risky permissions sprawl in your SDLC. ...

PCI DSS Self-Assessment Questionnaires: Choosing the Right Type
If you process credit card payments, you need to prioritize security. One way to guarantee this safety is by complying with Payment Card Industry (PCI) Data Security Standards (DSS) ...

Cybersecurity Insights with Contrast CISO David Lindner | 10/25/24
Insight #1: Chuck the checkbox, seize real risk To achieve a strong security posture, CISOs must avoid a "checkbox mentality" that prioritizes compliance over actual risk management and instead cultivate a security ...

CISOs Should Be Directing IAM Strategy — Here’s Why
By placing IAM strategy and enforcement under the CISO’s purview, enterprises can ensure that it is treated as a critical component of the overall security strategy ...

How to Reduce Risk From Misconfigured Build Assets
Get steps to prevent risky misconfigurations in your SDLC. ...

SEC is Not Accepting Half-Truths
The SEC has fined four major companies for materially misleading investors regarding cyberattacks.Tech in TroubleRegulatory actions have been brought against Unisys, Avaya, Check Point, and Mimecast for their purposeful decisions to not clearly ...

How to evaluate OT security program maturity
An OT security program can lead to better resource use, improved security operations, and tangible gains for the security posture of an OT operator. The benefits of running an OT security program ...

ISO 27001 Certification: A Detailed Guide on How to Get Certified
Editor’s note: This blog post is an excerpt from our eBook, Getting to Know the ISO 27001 Standard: Practical Guidance for Achieving ISO 27001 Certification. ISO/IEC 27001 is an information security standard ...