The fact that Federal agencies are prime targets for the most sophisticated cyber threats is undeniable. If cyberattacks are inevitable, then robust capabilities for security investigation, threat hunting, and rapid response are essential. Government cybersecurity professionals require visibility across their silos of...
In 2014, the Department of Defense (DoD) issued instructions that replaced DoD Information Assurance Certification and Accreditation Process (DIACAP) with the Risk Management Framework (RMF). The RMF is designed to be managed as a continual process as the risk posture evolves over time for each information...
Government agencies face unique technology challenges in today's world, including complex legacy IT systems, antiquated processes and a prohibitive legislative budgeting cycle. Because of these challenges, many agencies are looking for creative new approaches to overcome the obstacles preventing adoption of the latest...
Healthcare technology has made leaps and bounds in terms of its ability to improve patient outcomes, and yet many technologies are being deployed before security concerns can catch up.
Often, security leaders will look for an industry standard or best practice to help them navigate through the minefield. A recent Rsam survey revealed that
87% of InfoSec leaders said they plan to incorporate NIST CSF into their risk and compliance strategy.
NIST CSF can help CISOs understand their organization's...
Most organizations have embraced more than one software platform to automate their critical business processes. Platforms are becoming more flexible, allowing users to customize or configure their own applications. As your use cases grow, you may question whether you should leverage an existing platform for your next...
Today's business climate is one of unprecedented regulatory growth, data complexity and cybersecurity concerns. There is a corresponding increase in media attention, customer awareness and Board-level scrutiny.
Organizations must demonstrate that they have a viable process for managing risk and compliance (broadly...
How have major Canadian data breaches helped to shape incident response plans and data security at the organizational level? In this session, Imran Ahmad, an attorney who leads the cybersecurity practice at Miller Thomson and wrote the book, "Cybersecurity in Canada: A Guide to Best Practices, Planning and...
The pressure is on for all industries to upgrade their cyber-protection policies. New York is the first state to initiate a 180-day grace period for all financial services companies to upgrade both cyber policies and protection. As New York's new cyber mandates roll out, other states and industries will likely follow....
The pressure is on for all industries to upgrade their cyber-protection policies. New York is the first state to initiate a 180-day grace period for all financial services companies to upgrade both cyber policies and protection. As New York's new cyber mandates roll out, other states and industries will likely follow....
As home to many high-profile enterprises, including Coca-Cola, Home Depot and UPS, the state of Georgia is sensitive to cybersecurity threats. And, in fact, the new US Army Cyber Command headquarters is currently under construction at Fort Gordon in Georgia. As the state's AG, Carr is committed to protecting consumers...
The pressure is on for all industries to upgrade their cyber-protection policies. New York is the first state to initiate a 180-day grace period for all financial services companies to upgrade both cyber policies and protection. As New York's new cyber mandates roll out, other states and industries will likely follow....
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law-enforcement experts...
After any major health data breach, healthcare providers and business associates can expect an investigation by the Department of Health and Human Services' Office for Civil Rights. But some alleged security incidents also bring scrutiny from the Federal Trade Commission. This session will offer a case study on the...
After any significant breach, many parties - ranging from customers, clients, business partners and government agencies - will demand clarity about how a breach occurred and what data was stolen.
In the U.S., the Federal Trade Commission acts to ensure that any given organization is not negligent or reckless with...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ddos.inforisktoday.com, you agree to our use of cookies.