Managing Cybersecurity Compliance

Managing Cybersecurity Compliance

Managing Cybersecurity Compliance As the adage goes, “compliance does not equal security” and frankly, vice-versa. However, what compliance does is define the minimum-security requirements for a specific regulation, standard, or policy or like Bill Boney in the book CISO Desk Reference Guide, Volume 1 puts it: “regulatory and compliance requirements do not in and of

Read More
Managing The Audit Process

Managing The Audit Process

Managing The Audit Process Cybersecurity audit management is a crucial process that helps organizations ensure the security of their digital assets. With the increasing number of cyber threats, it has become essential for businesses to implement effective cybersecurity measures and regularly audit them to identify any vulnerabilities. The process of cybersecurity audit management involves conducting

Read More
Building Trusted Relationships Through The Risk Assessment Process

Building Trusted Relationships Through The Risk Assessment Process

This article first appeared in the CIO Applications Magazine here “Let’s not forget that it’s you and me vs. the problem…NOT you vs. me.” (different sources) Cybersecurity risk assessments are performed when new business opportunities are identified or to visualize risk around critical assets and processes, among other reasons. As a security leader or the

Read More
CA2 Security and Precog Security Announce the PCRA Service.

CA2 Security and Precog Security Announce the PCRA Service.

CA2 Security and Precog Security Announce the PCRA Service. Orlando, FL – New cyber landscape in 2023 and beyond is becoming a perfect storm with the rise of: cyber-attacks (one successful attack per second – study by the University of Maryland) increase in compliance fines (organizations lose an average of $4 million in revenue due

Read More