SIEM in red on binary code background

A New SIEM for a New World

Posted by - October 23, 2018
Moving from “Big Rules” to “No Rules” No two cybersecurity events are exactly alike, so it’s a fool’s errand to plan and protect solely against known threats. The need is greater now than ever for security teams to arm themselves with innovative SIEM technology with automatic threat detection and adaptive…
doctor holding stethoscope

Advance Preparation for an OCR HIPAA Audit

Posted by - October 22, 2018
8 Tips to Implement Now Shane Whitlatch, EVP at FairWarning, outlines the key controls companies should have in place to quickly and confidently respond to an OCR audit should they be selected. The best time to prepare for an audit is before you’re in one. Fortunately, requirements for various regulations…

“An Ounce of Prevention…”

Posted by - October 11, 2018
Q&A with Tony Phillips, Principal at McKool Smith Today we share an interview between CCI’s Publisher, Maurice Gilbert, and Tony Phillips, Principal at nationally recognized trial firm McKool Smith. Tony, who recently joined the firm, previously served as Senior Legal Officer for Corporate Ethics and Compliance at MD Anderson Cancer…

Scaling Cyber Supply Chain Risk Management with Dark Web Monitoring

Posted by - October 2, 2018
Implementing Protections Against Cyberattacks Many recent cyberattacks have come through exposures in third-party systems. There is an evident need to monitor the cybersecurity of third parties, and this puts the spotlight on cyber supply chain risk management (C-SCRM). Experts from Kroll outline what companies can do to protect their systems…
image of skull in programming code

empow Tool Becomes First SIEM to Automatically Detect and Respond to Threats Across the Cyber Kill Chain

Posted by - September 25, 2018
empow’s native artificial intelligence, natural language processing and cause-and-effect analytics now ingest user and account activity logs to correlate all data source types covering all stages of the attack lifecycle BOSTON (September 25, 2018) – empow, creators of a new kind of security information and event management (SIEM) system that…

Preparing for Cyber Risk

Posted by - September 13, 2018
Q&A with Steve Durbin, Managing Director of ISF Maurice discusses with Information Security Forum’s Managing Director, Steve Durbin, some of the key challenges businesses face today in terms of cybersecurity, as well as how ISF helps its clients manage those risks. Maurice Gilbert: What are the most significant risks that…
shield icon on digital background

New York’s Bold Move to Improve Cybersecurity

Posted by - September 11, 2018
Could It Have A Bigger Impact Than More Famous Legal Siblings? The California Consumer Privacy Protection Act and the GDPR went into effect earlier this year, and New York state is following suit; last week marked the compliance deadline for the NY DFS cybersecurity regulations. Compared to the broad provisions…
interior of a boardroom

Getting the Board on Board with Cybersecurity

Posted by - September 6, 2018
Why GRC Must Engage the Board of Directors in Data Security Organizations are still scrambling to comply with the GDPR. Tom Kelly, President and CEO of ID Experts, says the regulation has forced important conversations within organizations. Equally important is the board conversation on how to protect stakeholders’ interests. Tom…
cybersecurity concept padlocks on binary code

8 Realities in Managing Cyber Risk

Posted by - August 29, 2018
Thoughts on Increasing Cyber Resiliency Companies’ adoption of new technologies is outpacing their ability to protect against evolving cybersecurity threats. It used to be said that it’s not a question of IF an organization will be breached, but WHEN. Jim DeLoach suggests that companies either know they’ve been breached or…
security button on laptop with padlock

Why Companies Misunderstand Third-Party Cyber Risk

Posted by - August 23, 2018
Rethinking How We Discuss Vulnerabilities in the Digital Supply Chain The fundamental principle that makes the internet so powerful is the concept of connecting previously disparate systems, and yet many firms are struggling to understand the digital – and in particular, the cybersecurity – implications of their business relationships. Why…
GDPR concept: EU flag and padlock

GDPR: Where to After May 25?

Posted by - August 17, 2018
Look to the Mainframe In order to meet GDPR compliance, organizations need to demonstrate they are putting forth their best possible effort in protecting customer data. But “trying” does not mean “doing,” and even though they may have addressed the two most well-known and understood mandates – the right to…
graph showing increasing added value

4 C’s to Increase the Value of Internal Audit

Posted by - July 20, 2018
Ensuring the Effectiveness of a Risk-Based Audit Plan Protiviti’s Jim DeLoach explores how to bolster internal audit’s efforts in providing recommendations that are strong, actionable and in keeping with the board’s expectations. We’ve always believed that boards should ensure that their organizations maximize the full potential of internal audit. There…