Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Measure Actual Security Behaviour Change, Not training Completion

Discover:✅ The current state of the security awareness and training market✅ The future of Human Risk Management and how it is evolving✅ The importance of defining job roles in Human Risk Management✅ How to quantify and measure data related to Human Risk Management.

My Vendor Doesn't Have a SOC Report, How Do I Assess Them?

Though very helpful in representing the efficacy of a service provider’s third-party risk management program, SOC reports aren’t always available. Some service providers either don’t have the budget for a SOC report or are unwilling to undergo the laborious process of an SSAE-18 audit. While a lack of a SOC report should raise alarm bells during the due diligence process, it shouldn’t necessarily result in the disqualification of a prospective vendor.

More Network Security Monitoring Tools Doesn't Mean More Visibility

Network security monitoring tools are a critical component of any IT security toolkit. These tools help protect your network from online threats by looking for weaknesses and potential dangers in your organization's digital properties. But as digital ecosystems have expanded into the cloud, remote locations, and across geographies – the number of monitoring tools has skyrocketed.

Evolving Trends in the Cyber Insurance Market

Cyber insurance is the fastest-growing sector of the world’s insurance markets. But, a recent increase in ransomware attacks and business email compromises has led to a sharp uptick in claims, resulting in significant losses for cyber insurers and increased premiums. Cyber insurance customers need a way to increase their cyber resilience, reduce premiums, and improve their cyber postures.

11 Proven Risk Mitigation Strategies

Risk mitigation – that is, taking steps to reduce the exposure your organization has to risks you’ve identified – is crucial to any organization. The question is how to mitigate your risks, because organizations can employ any number of strategies to do so. Some of those strategies might be excellent fits with your business model; others, less so. This article will explore 10 proven risk mitigation strategies to help organizations effectively manage and minimize risk exposure.

How to Measure and Communicate Cybersecurity Progress

Last week, SecurityScorecard was invited to participate in a fireside chat with Michael Daniel, President & CEO of the Cyber Threat Alliance (CTA). SecurityScorecard’s Chief Business Officer, Sachin Bansal, joined Daniel for a lively discussion regarding how to measure cyber health and clearly communicate progress against those metrics.