How to Assign a Monetary Value to a Security Solution
Over the years, I’ve counseled numerous information security leaders on how to assign a monetary value to a security solution. It’s important to be able to speak in terms of…
Over the years, I’ve counseled numerous information security leaders on how to assign a monetary value to a security solution. It’s important to be able to speak in terms of…
CISOs from across industries selected Aqua Security and LogicHub as the winners of Security Current’s Security Shark Tank® during RSA 2018. The event brought security solutions providers face-to-face with CISO…
One of the fiduciary responsibilities that CISOs and their fellow C-suite executives have is to ensure that their organization abides by all laws and government regulations pertaining to their business.…
Over the past year or so, board members have become more aware of cybersecurity and their responsibility in this area. As a result, more security officers are being invited to…
There are specific state and federal laws that require companies to disclose when they have had a data breach, but there are few actual requirements to notify a law…
The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) becomes effective on May 25, 2018. It is an extensive and unifying regulation pertaining primarily to the privacy of personal data…
The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) was enacted on April 27, 2016, with the enforcement date being May 25, 2018. It replaces the European Data Protection Directive…
Women make up half the workforce in America, yet they hold fewer than 20% of board seats among the 2017 Fortune 1000 companies.[i] However, the Fortune 1000 companies are comparatively…
The most common identity and access management (IAM) authentication control in use today is a user ID and password, and there is growing awareness that passwords are incrementally becoming obsolete…
If your organization were to experience some sort of cyber incident – e.g., an intrusion of your network, theft of your intellectual property or sensitive data, Internet fraud – does…