CIO Magazine recently distributed an email promoting its “FutureEdge 50 Awards” with a playfully sinister line: I know what you did last summer... in IT... during the pandemic. Now get rewarded for your work. The plug is a reference to the campy late-‘90s slasher...
Data & Cybersecurity
Establishing a Third Party Vulnerability Campaign – Webinar Overview
In the wake of the Solarwinds attack, Tom Garrubba, Vice President and CISO, Shared Assessments led an expert panel discussion on establishing third party vulnerability campaigns. Speakers included: Frank Roppelt - Senior Manager, Security Policy and Vendor Risk at TD...
Is the New Federal IoT Law a Sign?
During the three years it took for the IoT Cyber Security Improvement Act of 2020 to complete its legislative journey, more than 11.8 billion devices were connected to the Internet. That’s a decidedly conservative estimate of IoT device growth, one based on former...
Data Privacy Day 2021 – If You Collect It, Protect It
Today is Data Privacy Day 2021! Privacy is celebrated each year on January 28th on Data Privacy Day creating a global community that respects privacy, safeguards data, and enables trust. 2020 may be remembered as the year of the pandemic; but it was also a year of...
What SolarWinds Means for IT Operational Due Diligence
As SolarWinds continues to be – and rightly so - a major discussion topic in cyber risk circles, I have noticed more conversation regarding the execution of the attack and less discussion as to what appears to be a lack of cyber hygiene at the infected organizations....
How the Grinch Stole Christmas: SolarWinds and the Immediate Effect on Your Third Parties
Just when you could not wait to get through 2020 another big headache (perhaps “migraine” is more appropriate) hit the world, only this time in cyberspace. The cyber risk world was rocked recently with the news of a very sophisticated attack on SolarWinds, a much-used...
Cyber Attacks: Better Vendor Risk Management Practices in 2021
Recent Cyber Attacks Highlight Importance of Proactive and Preventive Measures to Counter Intrusions Through Your Supply Chain The Recent State Attack On US Companies and Government Agencies In what has been called one of the most sophisticated cyber attacks in recent...
Work From Anywhere (WFA) – Upstream Impact of Downstream Lapses
Work From Anywhere (WFA) practices: our thoughts about how to ameliorate the potential impacts From an HR Work From Anywhere (WFA) staffing standpoint new challenges have arisen that go far beyond meeting the typical onboarding controls. Organizations at all...
Data Security and Privacy Trends – Closing the COVID Gap – 2021 Perspectives
This blogpost reviews Data Security and Privacy Trends as 2020 comes to an end. When COVID-19 triggered the move to working from home, many organizations sharpened their focus on reducing latency. They hustled to get the basics in place -- laptops, connectivity, etc....
Third Party Risks – A Cascading Convergence – 2021 Perspectives
In a recent report on the future of cybersecurity risks, The Wall Street Journal published a Top 10 list of systems and devices that hackers will attack in the coming decade. Santa Fe Group Senior Advisor Charlie Miller has been talking about most of these targets for...
Sub Topics
- Big Data
- Cloud Computing
- Cyber Crime
- Cyber Insurance
- Cyber Risk
- Cyber Skills
- Cyberattacks
- Cybersecurity
- Cyberwarfare
- Data
- Data Breach
- Data Privacy Day
- Data Protection
- Fraud
- Hacking
- Identity Protection
- Information Security
- Internet of Things (IoT)
- Mobile Devices
- PII
- Privacy
- Security
- Software Security
- Voice