Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

5 Things Holding Back Your Vulnerability Management Program and How to Overcome Them Step by Step

Welcome to our latest vulnerability management webinar, hosted by Scott Kuffer and Gene Bandy. In this session, Scott and Gene dive deep into the complexities and challenges faced by organizations in managing vulnerabilities and what you can do about it. Key Topics Covered: Why Watch This Webinar? Don't forget to like, comment, and subscribe for more in-depth webinars and expert discussions on cybersecurity and vulnerability management!

Ivanti EPM Cloud Services Appliance - Taking advantage of a backdoor to detect a vulnerability

At Bitsight, part of the Vulnerability Research team's core work involves analyzing vulnerabilities in order to create detection capabilities that can be implemented on an Internet-wide scale.

Complying With the New SEC Cybersecurity Regulations: A How-to Guide

‍Since the SEC's latest cybersecurity regulations went into effect, thousands of companies have already been compelled to submit their annual Form 10-K with the novel Item 1C. Similarly, dozens of organizations have filed updated Form 8-Ks to disclose cybersecurity incidents. Slowly but surely, these public reports are helping investors become more aware of the intrinsic relationship between cyber risk and market value.

7-Step Third-Party Risk Assessment Process

Third-party risk assessments identify, evaluate, and mitigate potential risks that third-party vendors might introduce into business operations. These processes form the foundation for a proactive risk management program, meeting regulatory requirements while safeguarding organizational assets and preventing reputational damage. Cyber risk assessments help identify any security hazards that could potentially disrupt operations and the supply chain.

How to Perform a Third-Party Risk Assessment in 2024

A Third-Party risk assessment is a critical component of a Third-Party Risk Management program. Without understanding how to properly execute these assessments, the efficiency of your TPRM program will remain limited. This post provides a detailed six-step guide for performing third-party risk assessments in cybersecurity.

Top 8 Third-party Risk Assessment Software Options in 2024

The right choice of Third-party risk assessment software will automate risk assessment workflows and boost the efficiency of your Third-Party Risk Management program. This post reviews the top eight contenders in the TPRM and supply chain risk management market to help you make the right choice for your third-party cybersecurity objectives.

DORA Regulation: What Financial Institutions Need To Do

As a cybersecurity company, Obrela is vigilant in monitoring the evolving regulations and how these impact our clients, especially those in the financial sector. With the introduction of the Digital Operational Resilience Act (DORA), we see a transformative step forward in the European Union’s approach to financial cyber resilience. Here’s an overview of what DORA entails and what it means for financial entities.

Understanding Risk in Cybersecurity: Balancing Cost and Protection

Cybersecurity is a game of risk management, balancing the costs of protection against potential losses. This clip emphasises the importance of quantitative risk assessment to set appropriate budgets and limits. Learn why it's crucial to align security spending with the value of assets being protected, and how to avoid overextending resources.

RiskOptics: Simplifying Governance, Risk, and Compliance for Tomorrow's Business Challenges

At RiskOptics, our mission is to make GRC simple, and it’s been that way since the inception of ZenGRC in 2009. With an in-house team of GRC experts and a development model focused on customer and industry challenges, we pride ourselves on being collaborative, innovative, and transparent.

Securing Student Data: TPRM for University Healthcare and Counseling

Universities are increasing their reliance on third-party providers for various services, such as electronic health records, telehealth platforms, insurance billing, and mental health support. While these partnerships enhance business operations and save valuable time, they also introduce significant cybersecurity risks.