Blog Archives

The Role of Cyber Due Diligence

Private Equity Firms Need Cyber Due Diligence

by | Nov 28, 2016 | “Private Equity Firms Need Cyber Due Diligence”

Verizon’s pending acquisition of Yahoo highlights a substantial risk faced by all private equity firms: how much cyber risk will the next transaction add to their portfolio?

Read more ›

Posted in Cyber Assessment, Data Security, Financials, Legal
Tags: , , , , , , , , ,

Cyber Risk and D&O

How Will Cyber Risk Evolve D&O?

by | Oct 24, 2016 | Cybernance – Cybergovernance Journal “How Will Cyber Risk Evolve D&O”

“Prudent board candidates have long demanded that directors’ and officers’ insurance be in place before accepting a board seat,

Read more ›

Posted in cyber risk, Cyber-Insurance, cybergovernance, Risk Management
Tags: , , , ,

Cyber Insurance and Cybersecurity – An Uncommon Model

Who’ll Be the Gap Closer in Cyber Insurance?

by | Jun 27, 2016  |  The CYBERGOVERNANCE Journal

A common model and vocabulary can close the chasm between the cybersecurity and cyber insurance communities,

Read more ›

Posted in Cyber-Insurance, Cybersecurity
Tags: , , , , ,

Cyber Risk and D&O Insurance

Told You So! The Impact of Cyber Risk on D&O Insurance

by | Apr 18, 2016 |  Cybergovernance Journal

Early in 2015,

Read more ›

Posted in cyber risk, cybergovernance, Cybersecurity, Financials
Tags: , , , , ,

Data Breach Planning 101

Data Breach Planning in 10 Easy Steps: How to Think Like A Litigator

When you have a breach, it’s not just the clients whose information has been stolen you’ll have to answer to… it’s their lawyers… and the regulatory agencies… and THEIR lawyers… and the media… and the court of public opinion.

Read more ›

Posted in Breach, Compliance, Content, Incident Response, Legal, Risk Management
Tags: , , , , , , , ,

Enterprise Breach & Cyber Risk Management

Data Breach Strategies and Cyber Risk Management for the Enterprise

By Dwayne Melancon 22 Oct 2015

Cyberattacks have been steadily rising. Some of the most sophisticated computer security systems in the world — from corporations,

Read more ›

Posted in Breach, Compliance, Content, Cyberattack, Cybersecurity, Incident Response, Insider Threats, Layered Defense, Risk Management
Tags: , , , , , , , , ,

Protecting your Business Against Insider Threats

Insider Threat: Protecting Your Business and Your Data

Businesses today thrive on connectivity. However, easily/remotely accessible networks come with numerous well-documented security risks, particularly from malicious cyber attacks.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Insider Threats, Layered Defense, Risk Management
Tags: , , , , , , , , ,

Compliance vs. Cybersecurity

Compliance vs. Cybersecurity: Insurers Face Competing Priorities

from: Help Net Security, 10/13

Over the next 12 months insurers will face competing priorities for resources and time, with cybersecurity preparedness challenging overall regulatory compliance readiness, according to Wolters Kluwer Financial Services.

Sixty percent of insurance professionals surveyed said cybersecurity will receive escalated priority at their organization,

Read more ›

Posted in Compliance, Cyber-Insurance, Cybersecurity, Incident Response, Regulatory, Risk Management
Tags: , , , ,

Three Mistakes that can Kill Your Small Business

Protect Your Small Business from these Mistakes

August 21, 2015
Whoops. He should have read this article!Whoops. He should have read this article!

No matter what line of work you’re in, constantly expanding upon your knowledge and skills is the best path to reach the next level.

Read more ›

Posted in Compliance, Content, Data Solutions, Incident Response, Layered Defense, Legal, Regulatory
Tags: , , , , , ,

The REAL Cost of Cybercrime

The Real Cost of Protecting Your Company from Cybercrime is NOT in Short-term Costs, But Long-term Savings

Reactive security can't buy lower costs.Reactive security can't buy lower costs.

Thanks to: Doug Bonderud

What’s the real cost of cybercrime? It’s a hard number to pin down, since there are so many factors influencing the total for any given company.

Read more ›

Posted in Breach, Compliance, Content, Cybersecurity, Financials, Hacks, Incident Response, Insider Threats, Layered Defense, Malware, Risk Management, Vendor Compliance
Tags: , , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:

Name:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity

Archives

Recent Tweets

Categories

Follow

Get every new post delivered to your Inbox

Join other followers: