Information Security and Cyber Liability Risk Management

As awareness grows due to media coverage of high profile data breaches, pending cyber legislation and continued advisories from cyber security professionals, information security and other cyber risks continue to represent at least a moderate threat to a majority of risk professionals. Board Members and Executive Management increasingly are recognizing the risks of a wide range of exposures such as lost or stolen data, violation of privacy laws, intellectual property infringement, social media, mobile devices, BYOD (Bring Your Own Device) and cloud computing. Although the strategies for addressing these risks vary, more and more organizations are adopting an enterprise-wide – or at least a multi departmental – approach to information security and cyber liability risk management. Insurance also is increasingly becoming a part of more organizations cyber risk management strategy.

Spotlight

SecureIT

SecureIT is a leading provider of cybersecurity management consulting and technical services to government agencies, corporations and non-profit organizations. Through its offering of security governance; risk management; engineering and operations; compliance; IT Audit and training, SecureIT enables its customers to implement and operate a risk-based approach to managing information technology while achieving compliance with applicable security and privacy regulations. Built from a management consulting pedigree and combined with deep security expertise, SecureIT has the insights to identify opportunities, strategies, and solutions that enable our customers to mitigate risks and provide resilience while improving operational efficiency.

OTHER WHITEPAPERS
news image

Security Challenges for the Energy Industry on the Industrial Internet of Things

whitePaper | November 4, 2022

The Industrial Internet of Things (IIoT) is a relatively new computing paradigm that combines machine learning (ML), artificial intelligence (AI), remote sensors, and device-control applications (or “apps”) to help businesses and industry achieve more efficient and reliable operations. In the oil and gas field, IIoT is used for a variety of purposes—from fully autonomous pump and valve control to remote sensing of security breaches at isolated wellsites.

Read More
news image

Security Protocol and Data Model (SPDM) Architecture White Paper

whitePaper | September 26, 2022

This white paper presents an overview of the SPDM architecture, its goals, and a high-level summary of its use within a larger solution. The intended target audience for this white paper includes readers interested in understanding the use of SPDM to facilitate security of the communications among components of platform management subsystems.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More
news image

Security, privacy, and compliance with Illumina Connected Analytics

whitePaper | August 23, 2022

Advances in next-generation sequencing (NGS) technologies have dramatically increased the amount of data generated, creating challenges in data analysis and interpretation. Illumina Connected Analytics (ICA) is a secure genomic data platform to operationalize informatics and drive scientific insights. ICA provides an extensible platform with a rich set of RESTful application program interfaces (APIs) and a command-line interface (CLI) tool to maximize workflow efficiency.

Read More
news image

ScienceLogic Global Security

whitePaper | September 30, 2022

As organizations become more digital in nature, securing the data becomes a top-of-mind priority given the cybersecurity challenges. ScienceLogic is committed to making the necessary investments in security and providing the transparency to gain the trust of our customer and partners.

Read More
news image

Optimizing Your Zero Trust Environment for Secure Video Conferencing

whitePaper | July 4, 2023

We’ve all heard the buzz around the virtual water cooler that Zero Trust Architectures are The Next Big Thing in network security, but what do we really know about them? And, perhaps more relevant to our discussion today, why should you care? This white paper looks at how and why Zero Trust (ZT) defines a data-centric security model and what that means in a real-time production environment. We build on that conversation to take a deeper look at how Pexip's video conferencing platform integrates with your existing ZT strategy and can even give you some new ZT concept ideas to consider.

Read More

Spotlight

SecureIT

SecureIT is a leading provider of cybersecurity management consulting and technical services to government agencies, corporations and non-profit organizations. Through its offering of security governance; risk management; engineering and operations; compliance; IT Audit and training, SecureIT enables its customers to implement and operate a risk-based approach to managing information technology while achieving compliance with applicable security and privacy regulations. Built from a management consulting pedigree and combined with deep security expertise, SecureIT has the insights to identify opportunities, strategies, and solutions that enable our customers to mitigate risks and provide resilience while improving operational efficiency.

Events