Definitive Guide to Cyber Risk Analytics
Even the most progressive companies are just starting their journey toward managing cyber risk effectively. This guide is designed to help you proceed down that path. Download our Definitive Guide to Cyber Risk Analytics today!Download
How 2020 Changed Cyber Risk Management
Almost overnight COVID-19 upended everyday life as we knew it. A risk that we didn’t even know we faced took center stage both personally and professionally. In this webinar, learn how businesses’ approach to cyber risk management changed in 2020
Building Your Cyber Budget for 2019: Part 2
Selecting cyber vendors and managing cyber budgets is a challenge. Join us as we attempt to cut through the clutter and show how to build a cybersecurity budget and identify the spending issues an organization needs to immediately address. This is Part 2 of our webinar series where we introduce a tactical approach to the cybersecurity budgeting process (as well as see common mistakes to avoid) and how to build your own cyber budget. We will offer an organizational budget plan worksheet to guide you along the way and share best practices and takeaways, as well as concrete examples.
Putting a dollar value on cyber risk with Mike Knox
VP of Sales Mike Knox explains Nehmiah Security's evolution and their development of the Risk Quantifier (RQ) platform. RQ allows organizations to calculate the financial risk of their cyber security vulnerabilities.
Risk Quantifying with Jerry Caponera
On Pentester Academy TV, Nehemiah's Security VP of Cyber Risk Strategy Jerry Caponera discusses quantifying risk with the RQ platform and bridging the gap between business and tech people in cyber.
Exclusive Webinar: How Cyber (measured in dollars) Earns a Spot on the Risk Register
This webinar covers the role of GRC in cybersecurity and tackles common pain points.
Intro to SRM
This is the first part of our video series on Security Risk Management (SRM) which explains why SRM is important and where you should start with measuring your organization's cyber risk.
Exploitabilities (SRM Series Part 2)
This is the second part of our video series on Security Risk Management (SRM) which explains the concept of Exploitabilities: the intersection between vulnerabilities and threats.
A Buyer’s Guide To Cyber Risk Analytics Solutions
This Buyer’s Guide outlines three key considerations when investing in solutions to operationalize risk analytics and empower effect cyber risk management.Download Buyer's Guide
Nehemiah Security provides a simple SaaS solution, Risk Quantifier™ (RQ), that automates cyber risk quantification in hours, not months. RQ continuously measures financial loss associated with cyber risk to enable you to make more informed business decisions.VIEW MORE
eBook: Cyber as a Business Enabler
Nehemiah Security is leading the charge to put cyber risk into motion. Let us introduce you to our risk methodology, which guides companies to transform Cybersecurity operations into a business enabler. This introductory guide arms the modern-day Cybersecurity leader to leverage existing resources to launch this transformation.Download eBook
CyberTangent - The "R" in GRC with Vicky Ames
In this CyberTangent episode, we are joined by Vicky Ames, Director of Information Security at Marriott International. Our podcast host is Landon Johnson. Today's topic is "The R in GRC."
CyberTangent - A Deep Dive into Insider Threats with Grant Elliott
In this CyberTangent episode, we are joined by Grant Elliott, CEO of Ostendio ostendio.com/ Our podcast host is Landon Johnson. Today's topic is "A Deep Dive into Insider Threats."
CyberTangent - The Problem with Vulnerability Patching with Kevin McLaughlin
In this CyberTangent episode, we are joined by Kevin McLaughlin, an expert with over 35 years of Law Enforcement, Corporate & Cyber Security experiences. Our podcast host is Landon Johnson. Today's topic is "The Problem with Vulnerability Patching." Let's jump in!
CyberTangent - Benefits and Challenges of Cyber Risk Quantification
In this CyberTangent episode, we are joined by Jason Syversen, CEO at Siege Technologies. Our podcast host is Landon Johnson.
Justify Your Security Spend Flowchart
Can you justify your security spend and prioritize security needs to senior management and the Board? This handy flowchart, peppered with key quotes from 7 security experts, shows you how.DOWNLOAD
CyberTangent - Cybersecurity & Technology Risk in Healthcare
In this CyberTangent episode, we are joined by Tiffany Rosik, a Healthcare Business and Operations Consultant. Our podcast host is Landon Johnson.
CyberTangent - A Look Back at Cybersecurity with Graham Cluley
In this CyberTangent episode, we are joined by none other than Graham Cluley! Our podcast host is Landon Johnson.
Case Study: Mid-Sized Bank
Like many growing organizations, the bank faced the challenge of gaining control over security standards for its endpoint devices. Not only was there a need to reduce vulnerabilities in the attack surface but also to demonstrate compliance.DOWNLOAD
CyberTangent - Cyber-Awareness: Then, Now and the Future
In this CyberTangent episode, we are joined by our very own, Mike Alexiou, CISO at Nehemiah Security. Our podcast host is Landon Johnson.
CyberTangent - Cross-Departmental Communication Issues
In this CyberTangent episode, we are joined by our guest Larry Whiteside, CISO at Greenway Health. At Nehemiah Security, our podcast host is Landon Johnson.
CyberTangent - Cyber Insurance - Friend or Foe?
In this CyberTangent episode, we are joined by our guest Richard Moore, Managing Director at Alvarez & Marsal. At Nehemiah Security, our podcast host is Landon Johnson, joined by our VP of Cyber Risk Strategy, Jerry Caponera.
CyberTangent - Episode 1 - Intro
CyberTangent is a cybersecurity podcast which will focus on topics like Security Risk Management, Cyber Risk Analytics, Malware Hunting and more. Please listen to this brief intro to get an idea of what to expect from the podcast. Welcome to CyberTangent!
Top 20 Security Breaches in 2017 So Far: What you need to know
This infographic displays statistics about the most dramatic security breaches that occurred in 2017 so far.VIEW MORE