Cybersecurity vs. Information Security

Cybersecurity vs. Information Security

by Eric Krell | August 16, 2021 | Cybersecurity, Information Security

You like potato and I like potahto You like tomato and I like tomahto Potato, potahto, tomato, tomahto. Let's call the whole thing off... --Ella Fitzgerald, Let’s Call the Whole Thing Off (featuring Louis Armstrong)   You say information security, I say cybersecurity.   ....

principle

Principle of Least Privilege Security Principle

by Charlie Miller | October 1, 2020 | Data & Cybersecurity, Data Protection, Information Security, Third Party Risk Management

Shared Assessments' Insurance Vertical Strategy Group came together for its quarterly meeting last week. Conversation was engaging and covered the widening scope of assessments, the multitude of third party types and the need for re-risking vendors in light of the current economy and threatscape. O ....

new narrative

Guide to Cybersecurity: Information Security Needs a New Narrative

by Sabine Zimmer | May 6, 2020 | Data & Cybersecurity, Information Security

Many companies have a fundamental information security problem, according to the co-authors of the A Leader’s Guide to Cybersecurity (Harvard Business Review Press, 2019). Those organizations pay too much attention to network and system vulnerabilities and too little attention to identifying and a ....

crystalball

2020 Information Security and Data Privacy Perspectives: 5 Not-So-Pretty Predictions

by Sabine Zimmer | January 27, 2020 | Data & Cybersecurity, Information Security, Privacy

When we asked Santa Fe Group Vice President and CISO Tom Garrubba to gaze into his crystal ball last month, he identified several events related to Third Party Risk Management that he thinks may materialize this year, including:   Privacy breaches (those caused by the mishandling of perso ....

Holistic Information Security – People, Process and Technology

by yadzinski | August 6, 2014 | Data Breach, Information Security, PHI

The attention to People and Process is lagging far behind   In reviewing the recent plethora of data breach stories, I am beginning to see a pattern here. While many companies answer to breaches with more and more technology, it appears that they are ignoring what may be the real root cau ....

The NSA, Snowden and Third-Party Risk: Preliminary Lessons Learned

August 5, 2013 | Information Security, Outsourcing, Third Party Risk, Vendor Security

Remember this: Edward Snowden Worked for a Third-Party Vendor. While it remains uncertain what exactly Mr. Snowden shared with other nations, we do know this: he wasn’t authorized to disclose classified information. Some may believe he is a hero, others believe he is a villain. It is clear, tho ....

Next Page »