Building Trusted Relationships Through The Risk Assessment Process

Building Trusted Relationships Through The Risk Assessment Process

This article first appeared in the CIO Applications Magazine here “Let’s not forget that it’s you and me vs. the problem…NOT you vs. me.” (different sources) Cybersecurity risk assessments are performed when new business opportunities are identified or to visualize risk around critical assets and processes, among other reasons. As a security leader or the

Read More
CA2 Security and Precog Security Announce the PCRA Service.

CA2 Security and Precog Security Announce the PCRA Service.

CA2 Security and Precog Security Announce the PCRA Service. Orlando, FL – New cyber landscape in 2023 and beyond is becoming a perfect storm with the rise of: cyber-attacks (one successful attack per second – study by the University of Maryland) increase in compliance fines (organizations lose an average of $4 million in revenue due

Read More
The Incident Response Process

The Incident Response Process

“Workflow is understanding your job, understanding your tools, and then, not thinking about it anymore.” Merlin Mann Navigating an incident is a long and complex process. Several phases begin even before an incident happens. NIST Special Publication SP 800-61 recommends four stages (with different sub-phases): Preparation, Detection & Analysis; Containment, Eradication & Recovery; and Post-Incident

Read More
Be Prepared to Respond to Cybersecurity Incidents – Here’s How

Be Prepared to Respond to Cybersecurity Incidents – Here’s How

Sooner rather than later, you will be in the middle of a significant cybersecurity incident. As part of the security team, you must be prepared to lead the company’s response through this crisis. Thus, to build a program and team that can respond to incidents quickly, you must answer this question: Do we have well-trained

Read More