ESG Brief: Utilizing Security Ratings for Enterprise IT Risk Mitigation

"In this ESG Brief, Jon Oltsik, Senior Principle Analyst at Enterprise Strategy Group, explores the enterprise need for objective security performance metrics in order to identify, quantify and mitigate cyber risk across the business ecosystem.
Download this paper to learn how Security Ratings are providing enterprises with the intelligence needed to:
Continuously measure and compare network security risk against peers, competitors and other business partners;
Proactively identify & respond to cyber threats throughout the extended enterprise;
Deliver objective and timely performance metrics to boards and executives to keep them informed and engaged with security strategy."

Spotlight

NexDefense, Inc.

NexDefense provides software products that increase the security and reliability of industrial control systems in critical infrastructure and processes focusing on the power, oil & gas and defense industries. NexDefense founders’ backgrounds include founding the network security intelligence company LogiKeep, now Cisco’s Intellishield™; Chief Security Officer (CSO) for AEP, a Fortune 200 energy company; CSO for North American Electric Reliability Corporation (NERC); creating the National Board of Security Examiners (NBISE) and the ICS curriculum for the SANS Institute; development of the Global Industrial Control Systems Professional (GICSP) certification; as well as decades of related industry security and technology experience. In October 2013, the Battelle Energy Alliance (BEA) signed a Patent and Copyright License giving NexDefense exclusive rights to commercialize its Sophia software. Sophia, an Industrial Network Anomaly Detection (INAD) system, was designed to empower control sy

OTHER WHITEPAPERS
news image

CISA Stakeholder-Specific Vulnerability Categorization Guide

whitePaper | November 9, 2022

The CISA Stakeholder-Specific Vulnerability Categorization (SSVC) is a customized decision tree model that assists in prioritizing vulnerability response for the United States government (USG), state, local, tribal, and territorial (SLTT) governments; and critical infrastructure (CI) entities. This document serves as a guide for evaluating vulnerabilities using the CISA SSVC decision tree. The goal of SSVC is to assist in prioritizing the remediation of a vulnerability basedon the impact exploitation would have to the particular organization(s).

Read More
news image

Dispatcher Phoenix Security

whitePaper | December 16, 2022

The advancement of technology has transformed the MFP into a key element of a company’s document infrastructure and workflow; however, as the role of the MFP has changed, the risk of security breaches has increased as well. Ensuring document confidentiality, allowing for system authentication, and providing clear audit trails are now necessities in every document-intensive industry. The objective of this white paper is to describe how Konica Minolta’s Dispatcher Phoenix software application helps organizations comply with their security requirements.

Read More
news image

Cybersecurity Technologies for Cloud Access

whitePaper | September 14, 2022

The enterprises’ network and network security architectures are unable to effectively serve the dynamic secure access requirements of digital business. The enterprise data center is no longer the center of access requirements for users and devices.

Read More
news image

Cybersecurity Whitepaper 2018

whitePaper | December 12, 2019

Most of the Small to medium-sized companies are unaware about the ways in which they’re vulnerable. More than 45% mistakenly believe they’re not a viable victim. They are just too small a target in comparison to larger organizations and tend to have a blind eye towards the cyber threats they face, which is in sharp contrast to what attackers think.

Read More
news image

Embracing Security Operations in the Educational Sector

whitePaper | December 22, 2022

Nearly every part of the educational sector has fallen victim to a cyberattack, from elementary schools to universities. Securing education is no longer a “nice to have” but a “must do” and is a growing concern among the global educational community. Creating and maintaining effective information security and cybersecurity operations in education comes down to people, processes, and tools. It’s crucial for IT and security leaders across the entire spectrum of educational institutions to find the right balance between the three. While there are success stories of achieving that balance, there’s always more to do to identify, understand, and mitigate cybersecurity risks to these organizations. Establishing and improving existing cybersecurity operations must become a priority.

Read More
news image

Security Operations Maturity Model

whitePaper | February 20, 2020

As the threat landscape continues to evolve, your cybersecurity efforts must follow suit. With your security operations center (SOC) at the core of your offense against threats, you must ensure that it can handle anything that comes its way. To be effective, you need to mature your SOC to stop threats early — before damage occurs. Whether your SOC is a virtual team of two to three or a 24x7 operation, maturing your security operations capabilities will help you achieve a faster mean time to detect (MTTD) and mean time to respond (MTTR) to cyberthreats. This white paper explores LogRhythm’s Security Operations Maturity Model (SOMM), which explains how to measure the effectiveness of your security operations. Through the model, you can learn how to mature your security operations capabilities, improving your resilience to cyberthreats.

Read More

Spotlight

NexDefense, Inc.

NexDefense provides software products that increase the security and reliability of industrial control systems in critical infrastructure and processes focusing on the power, oil & gas and defense industries. NexDefense founders’ backgrounds include founding the network security intelligence company LogiKeep, now Cisco’s Intellishield™; Chief Security Officer (CSO) for AEP, a Fortune 200 energy company; CSO for North American Electric Reliability Corporation (NERC); creating the National Board of Security Examiners (NBISE) and the ICS curriculum for the SANS Institute; development of the Global Industrial Control Systems Professional (GICSP) certification; as well as decades of related industry security and technology experience. In October 2013, the Battelle Energy Alliance (BEA) signed a Patent and Copyright License giving NexDefense exclusive rights to commercialize its Sophia software. Sophia, an Industrial Network Anomaly Detection (INAD) system, was designed to empower control sy

Events