Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Continuous Cyber Monitoring and Rating with SecurityScorecard

At Infocom Security Greece virtual event on April 23, 2021, Nadji Raib (Regional Sales Director, SecurityScorecard), Matthew McKenna (President of International Sales, SecurityScorecard), and Panagiotis Pierros (Managing Director, TICTAC LABORATORIES) presented how important it is not only to monitor your own security posture but also to monitor your 3rd party, 4th party, and your entire ecosystem of vendors and partners. The demo section shows how easy it is to instantly rate a company's current security posture and to prioritize what are the issues that need to be fixed to get a better security rating.

Full Cybersecurity Regulations Overview for DoD Prime and Subcontractors

This webinar was recorded and co-hosted with MAGNET: The Manufacturing Advocacy and Growth Network. As the NIST and Ohio MEP program advocates, MAGNET has invited a leader of their technological and educational cybersecurity partners, Ignyte Assurance Platform and Ignyte Institute, for a conversation on how to get on board with the emerging Cybersecurity Maturity Model Certification (CMMC).

Complying with HIPAA Breach Notification Rules

Learn all about the HIPAA breach notification rules and how you can best protect your business by being ready to comply with anticipated 2021 HIPAA breach notification rules. The HIPAA (Health Insurance Portability and Accountability Act) breach notification rules spell out how hospital systems, physicians, and other healthcare providers must notify their patients, as well as the U.S.

How to Manage Your Digital Risk in 2021

Though digital transformation is necessary, it's accompanied by some serious risks. This is the scaling conundrum of 2021 - organizations must embrace digitization to remain relevant, however, the greater the digital transformation, the greater the associated digital risks. Thankfully, with the correct digital risk management, organizations can continue to safely embrace digital transformation while mitigating the byproduct of digital risks.

The Most Common Corporate Cybersecurity Risks

“Corporate cybersecurity” refers to the tactics and methodologies that organizations use to safeguard sensitive data, prevent unauthorized access to information systems, and protect themselves from cyber attacks such as malware or ransomware attacks, trojan viruses, social engineering or phishing email, endpoint breaches, and so forth. Cybercrime can be catastrophic for small businesses, but even large enterprises don’t have the luxury of taking cybersecurity for granted.

Cyber Risk - Why Corporate Governance Matters

In the high-pitched, relentless battle against cyberattacks, much of the attention and energy has been focused on technical solutions, regulatory compliance, and balancing risks with opportunities. What about corporate governance? What role does executive and board-level oversight play in ensuring robust cybersecurity … and what role should it play?

Corporate Reputation | NED Webinar Series - Part 1: External Threats

In partnership with The Non-Executive Directors Association (NEDA) Our three-part webinar series on the current risk landscape and emerging threats/opportunities features speakers from Kroll, NEDA, and a range of experts and seasoned non-executive directors (NEDs). Reputation is everything, and as we contemplate life beyond COVID-19 crisis management, Kroll executives have been considering a range of contemporaneous risks that should be on every board’s agenda. They’re even evaluating how failure to consider these risks can impact a company’s corporate reputation.

What is a Compliance Risk Assessment?

As global regulations for data privacy and cybersecurity continue to proliferate, the pressure for organizations to manage compliance risk grows. To meet the demand for greater compliance risk management and value for corporate stakeholders, compliance professionals must be sure they have a thorough understanding of their compliance obligations and potential vulnerabilities.