Incident Response

Protect What Matters Most: Risk Management, Cyber Security and Incident Response for Modern Business

As businesses adopt digital practices more than ever, now is the time to prepare for the next generation of threats and attacks expected to continue, and even increase, in 2021 and beyond. Hosted by some of the most well-known industry experts, our upcoming webinar will highlight risk management for cybersecurity in three areas – defense, legal and financial risk transfer. Business leaders will learn: How to identify potential risks Assess their impact, and Plan an appropriate response to mitigate against potential financial and legal liabilities Special Guest: Ms. Bolanle Akinrimisi, Beazley Group, Data Breach Insurance Ms. Akinrimisi is an expert in cyber risk claims, Bolanle Akinrimisi is currently Beazley’s Cyber …

Protect What Matters Most: Risk Management, Cyber Security and Incident Response for Modern Business Read More »

Protect What Matters Most

Keeping “IT” Security Real, Re-imagining Cyber Defenses

Much has changed due to Covid-19, Remote Work from Home (or Anywhere) and the ongoing SolarWinds fiasco have caused every cybersecurity team to review “what really matters in terms of cyber risk,” and master the basics as the foundation of their security program. As I have been known to say, in ‘cyber’ what was once true yesterday, may not be so today! It is often recommended to check-in from time-to-time and explore what may have changed. This continues to ring true today. When Covid-19 lockdowns were officially announced in March of 2020, much of the workforce had to rapidly shift to a new mode of working opening or compound existing …

Keeping “IT” Security Real, Re-imagining Cyber Defenses Read More »

Keeping IT Security Real Re-imagining Defenses

Mitigating Cloud Vulnerabilities – National Security Agency

National Security Agency – Mitigating Cloud Vulnerabilities National Security Agency guidance on how to reduce overall exposure to the risk cloud presents and how to enhance your security posture. While careful cloud adoption can enhance an organization’s security posture, cloud services can introduce risks that organizations should understand and address both during the procurement process and while operating in the cloud. Fully evaluating security implications when shifting resources to the cloud will help ensure continued resource availability and reduce risk of sensitive information exposures. To implement effective mitigations, organizations should consider cyber risks to cloud resources, just as they would in an on-premises environment. This document divides cloud vulnerabilities into …

Mitigating Cloud Vulnerabilities – National Security Agency Read More »

National Security Agency - Mitigating Cloud Vulnerabilities
Scroll to Top
error: Alert: Content selection is disabled!!