Guest Post: Setting the Stage – Security in the Business

Within Security Operations Centers (SOCs), and throughout IT security departments, people and tools rule supreme. Cybersecurity management within most organizations is dictated by spending on human resources and technology, with little to no emphasis on Return on Investment (ROI) analysis, and little to no proof-of-value analysis on the myriad of security products in use. &n [...]

Keep Reading

Mastering M&A Cyber Risk

Don’t have time to read? Start listening to this blog post now: Every April, golf and business legends descend upon the tranquil 18-holes of Augusta National Golf Course to take in the splendor of the greens and the most unforgettable moments in golf. These are the best of the best from across the globe duking it out for the coveted green jacket. Competition is fierce. [...]

Keep Reading

Data Breach Report: March 2018

Below is a compilation of news articles covering some of the notable data breaches that occurred in March 2018. Doesn't this really put things into perspective? This month's highlight, of course, is the Facebook and Cambridge Analytica data scandal. UpGuard silent on why it pulled Capital One breach claims - March 2 The Breach from the East - March 5 Payment Card B [...]

Keep Reading

When Quantifying Cyber Risk, Make it Real and Tangible

Don’t have time to read? Start listening to this blog post now: Nehemiah Security partnered with MightyGuides to interview seven industry experts with the mission of advancing the risk management conversation among cyber professionals. Each interviewee was posed the question, “If your friend was put in charge of measuring cyber risk at their company, what advice woul [...]

Keep Reading

When Less is More in Cybersecurity

Don’t have time to read? Start listening to this blog post now: I am convinced any business leader who strives to optimize an operation has heard the cliché, “Less is more!” While cybersecurity professionals have certainly heard the expression, their reality is quite the opposite. Consider the fact that even successful security leaders are walking a thin line betw [...]

Keep Reading

CyberTangent – Cyber as a Driver for Business Decisions with Richard Van Horn

In this CyberTangent episode, we are joined by Richard Van Horn, a Cybersecurity professional and owner of www.technologyatrisk.info/. Our podcast host is Landon Johnson. Today’s topic is Cyber as a Driver for Business Decisions. Let’s jump in!

Keep Reading

Guest Post: Solving the Security Risk Puzzle, A Brief History

Don’t have time to read? Start listening to this blog post now: As a 20+ year security, compliance, and risk veteran, I am surprised that no one has solved the security risk puzzle yet.  Trust me, I’ve tried, and so have others.  But, here we are in 2018, still talking about the same issues with a new slant… The European Union’s General Data Protection Regul [...]

Keep Reading

Event Review: SAP GRC

Our team attended the SAPInsider GRC 2018 event last week in Las Vegas—it was powerful! We want to share some of our notes in case you weren’t able to make it (or are considering attending next year). What were the top 3 things you learned at the event? -The RQ value proposition of quantifying cyber risk in financial terms resonated strongly with GRC professionals. We he [...]

Keep Reading

CyberTangent – Cybersecurity & Technology Risk in Healthcare with Tiffany Rosik

In this CyberTangent episode, we are joined by Tiffany Rosik, a Healthcare Business and Operations Consultant. Our podcast host is Landon Johnson. Today's topic is Cybersecurity & Technology Risk in Healthcare. Let's jump in!

Keep Reading

SPICE it up and gain that funding for your security operations

Don’t have time to read? Start listening to this blog post now:  First, let’s have storytime. The following is a real story told by a former Town Councillor in Lunenburg County, Virginia: “In 1989 I became chair of the Solid waste committee as a councillor with the Municipality of the District of Lunenburg in Virginia. I kicked off a study on how to best reduc [...]

Keep Reading