“If you delete it, it’s gone forever!” – CISOs who have not succeeded at eliminating unsecured external data This is potentially the most dangerous misconception any CIO or CISO can… Continue reading How to Stop Data Brokers? Continuity is Critical
role: CISO & CIO
Executive Security – In Data Privacy Chess, King and Pawn are Equal
CEOs, other top executives and their families are increasingly the target of violent physical attacks as ideological extremism is on the rise. They’re also a prime target for cyber attacks… Continue reading Executive Security – In Data Privacy Chess, King and Pawn are Equal
External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Information security, cyber security and the latest iteration, external data security are critical to the health and viability of any organization. Companies of all sizes and types routinely invest significant… Continue reading External Data Privacy Metrics and KPIs – A How to Guide for Strong Compliance
Case Study: Finance Company Reverses Sales Slump by Promoting External Data Privacy Mgt. Practices
Customer: National Registered Investment Advisory (RIA) Firm with offices in 20 US states and over $95 billion under management Challenge: Solution: Results: Challenge: During a year-over-year analysis of new account… Continue reading Case Study: Finance Company Reverses Sales Slump by Promoting External Data Privacy Mgt. Practices
Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
There’s an old joke among economists that goes, “Ask three economists about the state of the economy and you’ll get five answers.” Though it’s not a laughing matter, the same… Continue reading Cyber Security Isn’t Enough – The Information Security Ecosystem Dies Without External Data Privacy
The Shortcomings of Third-Party Risk Management and How to Get it Right for Your Organization
Data breaches targeting third-party vendor relationships are on the rise. Especially those leveraging phishing and other social engineering methods. This fact reveals a weakness in most organizations’ cyber security regimens. … Continue reading The Shortcomings of Third-Party Risk Management and How to Get it Right for Your Organization
Supply Chain Attacks are On the Rise – A Primer on Supply Chain Privacy Risk
Supply chain privacy risk presents a new attack surface for organizations with complex supply chains. Cyber criminals, hackers and other threat actors play an ongoing game of cat and mouse… Continue reading Supply Chain Attacks are On the Rise – A Primer on Supply Chain Privacy Risk
External Data Hygiene is a Literal Lifesaver for Targeted Industries
What can proactive employers in controversial, targeted industries do to help protect their workforce from the ballooning risk of terrorist threats/attacks? The number, frequency and intensity of attacks on workers… Continue reading External Data Hygiene is a Literal Lifesaver for Targeted Industries
The Rapid Growth of AI-Powered Social Engineering Attacks
Ferris Bueller famously said, “Life moves pretty fast. If you don’t stop to look around once in a while, you could miss it.” CISOs, CIOs and other IT leaders grappling… Continue reading The Rapid Growth of AI-Powered Social Engineering Attacks
Industrial & Corporate Espionage – New Variants of an Old Problem and How to Protect Your IP
Industrial and corporate espionage is not a new problem. Theft of intellectual property by corporate competitors and hostile foreign governments has gone on for centuries. However, the methodologies have advanced… Continue reading Industrial & Corporate Espionage – New Variants of an Old Problem and How to Protect Your IP