Webinar: How to Build a Security Program Budget
Check out our webinar from Shane Peden and Christian Hyatt in which they discuss how to design a security program budget and get it approved. https://youtu.be/Q4LAtW5WqYk
Check out our webinar from Shane Peden and Christian Hyatt in which they discuss how to design a security program budget and get it approved. https://youtu.be/Q4LAtW5WqYk
This blog post on developing and retaining security professionals at your high growth technology company is part of a multi-part series on designing an information security program in alignment with [...]
Check out our webinar from Christian Hyatt and Shane Peden where they discuss roadmaps and business cases for security, privacy, and compliance for healthcare technology companies. https://youtu.be/z4aFZnPWGRU
Understanding the results of a HITRUST engagement and how to use them. During your vendor due diligence process, a vendor sends you their HITRUST report. What exactly does this report [...]
A quick explanation of one of the most influential and misconfigured computing utilities. A classic view into some of the tools use by pentesters at risk3sixty. You’re a [...]
How to progress toward a truly secure organization and infrastructure after penetration testing. You did it – you paid for penetration testing services. Whether it was to fulfill a potential [...]
And how they are still relevant today. On a warm, sunny day in July 2017, one of the world’s most catastrophic and rampant demonstrations of ransomware began. Commonly referred to [...]
Global research and advisory firm, Gartner, forecasts that information security spending will exceed $124 billion in 2019, yet cyber defenses continue to fail. Organizations large and small continue to experience [...]
Why the Internet of Things is a penetration tester’s most valuable asset. As technology moves at a seemingly exponential rate of growth and changes every day, more and more devices [...]
When building your Information Security Management System (ISMS) as part of ISO 27001 program implementation one of the most important elements of the system of management for your security program [...]