Cyber Leaders of the World: Raz Karmi, CISO at SimilarWeb

Cyber Leaders of the World: Raz Karmi, CISO at SimilarWeb

Please tell us a bit about yourself, your background and your journey in SimilarWebI have over 20…

FINRA

What is FINRA? FINRA, the Financial Industry Regulatory Authority, is a non-profit self regulatory organization that ensures…

OWASP MASVS

What is OWASP MASVS? The Open Web Application Security Project (OWASP) is a non-profit international organization dedicated…

Nevada Privacy Law

What is the Nevada privacy law? The Nevada Revised Statutes on Security and Privacy of Personal Information…

POPIA

What is POPIA? South Africa’s new data privacy framework is the Protection Of Personal Information Act. It…

ISO 22301

What is the ISO 22301 standard? ISO 22301 is an international standard for Business Continuity Management. It…
Defense

Defense

Defending the defenders—that’s what Centraleyes does. It’s a risk remediation platform so integrated and user-friendly that briefing…
Government

Government

Simplified government operations? It is achievable by those who deploy Centraleyes—the new risk management platform that automates…
Retail

Retail

The vast, dynamic universe of retail transactions and marketing fuels the world’s economy—but is also vulnerable at…
Energy

Energy

The world’s energy infrastructure sustains productive life on earth. It is both vital and vulnerable—and thus demands…
Insurance

Insurance

In recent years, insurance companies have gone through a digital transformation process, improving their portfolio offerings and…
Financial Institutions

Financial Institutions

In the financial services industry, data security is more essential than ever. Institutions have migrated to online…
Life Science

Life Science

In recent years, as digital health solutions became more prevalent and in-demand, Life Science institutions have become…
Higher Education

Higher Education

Over the years, academic institutions adopted many new and advanced digital and technological solutions to provide staff,…

CMMC

What is the CMMC Standard? The CMMC certification methodology was developed by the Department of Defense (DoD)…

FFIEC

What is the FFIEC Compliance Framework? The Federal Financial Institutions Inspection Council (FFIEC) is a structured interagency…

HIPAA

What is HIPAA? The Health Insurance Portability and Transparency Act of 1996 (HIPAA), is a collection of…

NIST 800-82

What is the NIST SP 800-82 framework? The National Institute of Standards and Technology (NIST) Special Publication…

PCI DSS

What is PCI DSS? The Payment Card Industry Security Standards Council establishes technical and operational requirements to…

SOX

What is the Sarbanes-Oxley Act? Sarbanes-Oxley Act (SOX), is a regulation that was signed into law on…

NIST 800-207 (Zero Trust)

What is the Zero Trust Model? Zero trust is a growing security model that is based on…

NERC CIP

What is NERC CIP compliance? The North American Electric Reliability Corporation (NERC) is a global regulatory authority…

NYDFS

What is the NYDFS Cybersecurity Regulation? The New York Department of Financial Services (NYDFS) Cybersecurity Regulation (23…

GDPR

What is the GDPR? The General Data Protection Regulation (GDPR) is a European Union law that went…

NIST Privacy Framework

What is the NIST Privacy Framework? The National Institute of Standards and Technology (NIST) recently released the…

SOC 2 Type II

What is SOC 2 Type II compliance? SOC 2 (System and Organization Controls 2) is an auditing…

HECVAT

What is HECVAT? The Higher Education Community Vendor Assessment Toolkit (HECVAT) is a risk assessment template that…

FERPA

What is FERPA? The Family Educational Rights and Privacy Act (FERPA) of 1974, also known as the…

NIST SP 800-171

What is NIST SP 800-171? The National Institute of Standards and Technology (NIST) is a non-regulatory agency…

NIST SP 800-53

What is the NIST SP 800-53 framework? NIST SP 800-53 was created to provide federal agencies with…

COSO

What is the COSO Framework? The Committee of Sponsoring Organizations of the Treadway Commission (COSO), a voluntary…

ISA/IEC 62443

What is the ISA/IEC 62443 framework? The International Society of Automation (ISA) and the International Electrotechnical Commission…

NIST 800-46

What is the NIST SP 800-46 framework? The US Commerce Department’s National Institute of Standards and Technology…

NY SHIELD Act

What is the NY SHIELD Act? On March 21, 2020, the data security provisions of New York’s…

PSD2

What is PSD2? The Payment Services Directive (PSD) of 2007, was replaced by the Revised Payment Services…

COBIT 5

What is COBIT 5? COBIT is an IT management framework created by ISACA (Information Systems Audit and…

ICDM

What is the ICDM Framework? The Israeli Cyber Defense Methodology (ICDM), also known as The Corporate Defense…

OWASP ASVS

What is the OWASP ASVS? The Open Web Application Security Project (OWASP), is a non-profit international organization…

FedRAMP

What is FedRAMP? The Federal Risk and Authorization Management Program (FedRAMP) is a US government-wide framework that…

MITRE ATT&CK

What is the MITRE ATT&CK Framework? MITRE ATT&CK is a framework that organizes and categorizes the different…

ISO 27001

What is ISO/IEC 27001? ISO/IEC 27001 is a member of the ISO 27000 family of standards. The…

CIS Controls

What are the CIS Controls? The CIS Critical Security Controls (CSC) are published by the Center for…

CSA

What is the CSA? The Cloud Security Alliance (CSA) is an organization committed to securing cloud computing…

ISO 27701

What is ISO/IEC 27701? ISO/IEC 27701 establishes guidelines and describes standards for implementing, designing, maintaining, and continuing…

GLBA

What is the GLBA Act? The Gramm-Leach-Bliley Act (GLBA), also recognized as the Financial Modernization Act of…
Centraleyes Announces the Addition of the NIST 800-82 Framework to its Framework Library

Centraleyes Announces the Addition of the NIST 800-82 Framework to its Framework Library

Centraleyes is proud to announce the addition of the NIST 800-82 Industrial Control Systems Cybersecurity Framework to…
Centraleyes is Featured in the Exclusive STAR Registry as an Official CSA Vendor

Centraleyes is Featured in the Exclusive STAR Registry as an Official CSA Vendor

Centraleyes is proud to announce that the company is an official CSA STAR vendor, featured in the…
Centraleyes Maps the PSD2 Regulation to its Growing Framework Library

Centraleyes Maps the PSD2 Regulation to its Growing Framework Library

Centraleyes is proud to announce the addition of the PSD2 regulation to the growing framework library. The…
Centraleyes Welcomes Co-Founder of Optiv, Dan Burns, to its Board of Directors

Centraleyes Welcomes Co-Founder of Optiv, Dan Burns, to its Board of Directors

Dan Burns, co-founder and former CEO of Optiv, one the largest SSI’s in the world, brings over…
Automate the Creation and Maintenance of a Risk Register, Saving Hours on Manual Work

Automate the Creation and Maintenance of a Risk Register, Saving Hours on Manual Work

Centraleyes’s one-of-its-kind Automated Risk Register is the latest unique capability released in the platform’s cutting-edge, automated tools…
Centraleyes Adds the FERPA Data Privacy Standard to its Framework Library

Centraleyes Adds the FERPA Data Privacy Standard to its Framework Library

Centraleyes is excited to announce the latest addition to the Centraleyes framework library, the FERPA Data Privacy…
Don’t Keep Your Head in the Clouds – How to Protect Yourself from Virtual Risk

Don’t Keep Your Head in the Clouds – How to Protect Yourself from Virtual Risk

In todays world where many organizations have adopted and migrated most of their activity to the cloud,…
Centraleyes Announces the Addition of FedRAMP to its Framework Library

Centraleyes Announces the Addition of FedRAMP to its Framework Library

Centraleyes is proud to announce the addition of FedRAMP to the growing framework library. FedRAMP is one…

NIST CSF

What is the NIST CSF? The NIST Cybersecurity Framework, also known as the NIST CSF, enhances Critical…
Centraleyes Continues to Expand Its Global Network of Strategic Partners with UK-based ITC Secure

Centraleyes Continues to Expand Its Global Network of Strategic Partners with UK-based ITC Secure

Online PR News – 04-May-2021 – New York – Centraleyes is excited to announce its latest strategic…
Centraleyes Adds the Recent Privacy Framework by NIST to its Framework Library

Centraleyes Adds the Recent Privacy Framework by NIST to its Framework Library

Centraleyes is strengthening its framework library with a new privacy framework recently published by NIST. The National…
Centraleyes Disrupts Risk Management With the First Ever Automated Risk Register

Centraleyes Disrupts Risk Management With the First Ever Automated Risk Register

Centraleyes has released its latest platform update, which included a one of its kind capability – an…
How to Build a Cyber Risk Assessment Matrix

How to Build a Cyber Risk Assessment Matrix

When conducting a cyber risk assessment, you need to quantify the risk levels of various scenarios taking…
Centraleyes Maps the CIS Top 20 Critical Controls to its Framework Library

Centraleyes Maps the CIS Top 20 Critical Controls to its Framework Library

Centraleyes continues to expand its framework library, with the latest addition of the CIS Top 20 Critical…
Flash Webinar: How to Know When it's Time to Build a Risk Management Program

Flash Webinar: How to Know When it's Time to Build a Risk Management Program

Companies in hyper growth mode as well as mid-market enterprises are often focused on product development and…
Why a Cyber Risk Management Solution May Be Right for You

Why a Cyber Risk Management Solution May Be Right for You

In a world where technology has become the dominating force for every organization, and the dependency on…
The CIS Top 20 Controls: What Are the Top Level Controls?

The CIS Top 20 Controls: What Are the Top Level Controls?

In a world where data breaches are a daily occurrence, implementing cyber security controls that can protect…
Enhancing Cyber Risk Management Through the Power of Automation - Boutique Webinar

Enhancing Cyber Risk Management Through the Power of Automation - Boutique Webinar

Organizations in every industry are in a constant race against emerging cyber risk and an ever-evolving threat…
Add a New Framework and Distribute Assessments in Your Organization

Add a New Framework and Distribute Assessments in Your Organization

Adding a new framework to an organization with the Centraleyes platform can be done with the click…
Centraleyes Partners with Chile-based, Tech Services Provider, Policomp

Centraleyes Partners with Chile-based, Tech Services Provider, Policomp

Online PR News – 05-March-2021 – Tel Aviv – Centraleyes is proud to announce its strategic expansion into…
View Your Organization's Risk Scoring Through the NIST Tiering Lens

View Your Organization's Risk Scoring Through the NIST Tiering Lens

In our latest Centraleyes release we’ve added a NIST Tiering capability to the platform, which allows you…
Centraleyes Enhances its Framework Library with INCD Guidelines for Stronger Cyber Resilience

Centraleyes Enhances its Framework Library with INCD Guidelines for Stronger Cyber Resilience

Centraleyes is strengthening its framework library with yet another risk guideline by the INCD. The Israel National…
Energy Industry Dedicated NERC CIP Standard - Now in the Centraleyes Framework Library

Energy Industry Dedicated NERC CIP Standard - Now in the Centraleyes Framework Library

Centraleyes continues to expand its framework library coverage by adding NERC CIP, giving the energy industry a…
Most Intuitive Way for Compliance With the Framework Navigation Tool

Most Intuitive Way for Compliance With the Framework Navigation Tool

The Centraleyes platform has a unique breakdown screen that allows you to navigate through different frameworks in…
Flash Webinar: From Technical to Business Risk - How to Communicate With Your Board

Flash Webinar: From Technical to Business Risk - How to Communicate With Your Board

Organizations in every industry are in a constant race against emerging cyber risks, which have become the…
Zero Trust Framework - New Addition to the Centraleyes Framework Library

Zero Trust Framework - New Addition to the Centraleyes Framework Library

Centraleyes has added another key risk framework to its extensive framework library – the NIST SP 800-207…
Always Prepared for the Next Task With Automated Remediation

Always Prepared for the Next Task With Automated Remediation

The Centraleyes platform enables you to automatically collect, analyze and identify gaps. Once the gaps are identified,…
Centraleyes Expands its Framework Library With NIST 800-171

Centraleyes Expands its Framework Library With NIST 800-171

Centraleyes is proud to announce the addition of NIST 800-171 to its library of frameworks and standards…
5 Considerations for Cybersecurity Risk Management

5 Considerations for Cybersecurity Risk Management

Cybersecurity risk is a moving target which literally changes from day to day. New attack vectors, zero…
Automation in Risk Management: Readying for the Future

Automation in Risk Management: Readying for the Future

Risk management is a concept that has been around for many years, though we have seen a…
Effective Team Work With Drag-and-Drop Control Assignment

Effective Team Work With Drag-and-Drop Control Assignment

The Centraleyes platform gives you the ability to assign a specific question to one or multiple users…
Flash Webinar: What You Can Learn From the SolarWinds Attack to Lower Your Chances of Being Breached

Flash Webinar: What You Can Learn From the SolarWinds Attack to Lower Your Chances of Being Breached

Following 60 days of intense analysis, our cyber research team has uncovered a number of unique findings…
Get Real-Time Critical Alerts That are Specifically Relevant to You

Get Real-Time Critical Alerts That are Specifically Relevant to You

Centraleyes’s Critical Alerts Feed provides ongoing, real-time intelligence on new threats, vulnerabilities and regulations. This highly impactful…
Flash Webinar: Supply Chain, 3rd-Party Vendors and the Silent Assassin Among Them

Flash Webinar: Supply Chain, 3rd-Party Vendors and the Silent Assassin Among Them

Across the different industries, organizations are affected by the growing number of cyber attacks. The increased use…
MSSPs Can Manage Multiple Clients Under One Platform

MSSPs Can Manage Multiple Clients Under One Platform

Centraleyes is the only company in the world that has created a dedicated solution for Service Providers.…
Centraleyes Selected as Top 10 Cyber Security Startups

Centraleyes Selected as Top 10 Cyber Security Startups

Centraleyes is extremely proud to announce that it has been selected as one of the top 10…
Onboard a New Vendor in Just 30 Seconds

Onboard a New Vendor in Just 30 Seconds

Onboarding new vendors to your Vendor Risk Assessment could take hours of work if not days due…
Centraleyes Official Brand Video Released

Centraleyes Official Brand Video Released

Centraleyes is proud to present our official brand video! The video captures our brand’s optimistic spirit in…
Centraleyes Partners with the Cyber Alliance to Protect Healthcare Systems

Centraleyes Partners with the Cyber Alliance to Protect Healthcare Systems

Online PR News – 21-December-2020 – Tel Aviv – SaaS-based cyber risk platform provider Centraleyes has partnered…
Flash Webinar: Cyber Risk Management - it Doesn't Have to Be So Painful

Flash Webinar: Cyber Risk Management - it Doesn't Have to Be So Painful

Cyber Risk Management is not a simple matter, but there are simple ways to ease the pain…
Turn Hours of Work Into Seconds with Centraleyes Vendor Risk Profile

Turn Hours of Work Into Seconds with Centraleyes Vendor Risk Profile

When conducting vendor risk management it is important to create a risk profile on each and every…
Always Informed with Centraleyes Domain Benchmarking

Always Informed with Centraleyes Domain Benchmarking

When running risk management in your organization there is a tremendous amount of data points for collecting…
CyGov Appointed Michelle Offir Geveye as Marketing Lead

CyGov Appointed Michelle Offir Geveye as Marketing Lead

CyGov has announced the appointment of Michelle Offir Geveye as the new Marketing Lead for the company…
Trevor Failor Named Head Of Sales At CyGov

Trevor Failor Named Head Of Sales At CyGov

Bringing two decades of experience in Cyber Security and SaaS sales, Trevor Failor has been appointed as…
CyGov Launches The Centraleyes™ Brand— Superior Platform Automating Inputs, Data & Visualizing Risks

CyGov Launches The Centraleyes™ Brand— Superior Platform Automating Inputs, Data & Visualizing Risks

CyGov has re-branded its cutting-edge cyber risk management platform that gives an unparalleled understanding of digital and…
Explaining HIPAA in the Corona age

Explaining HIPAA in the Corona age

If your business or organization operates in the healthcare space, you are most probably familiar with HIPAA…
Cygov Continues Upward Growth - Oleg Movchan Joins Board of Directors

Cygov Continues Upward Growth - Oleg Movchan Joins Board of Directors

Oleg Movchan, a capital markets and risk management veteran, has joined the company’s Board of Directors. 04-June-2020…
Jimmy Sanders, Head of Info Security at Netflix DVD, Joins Cygov Advisory Board

Jimmy Sanders, Head of Info Security at Netflix DVD, Joins Cygov Advisory Board

Sanders, one of the foremost authorities on contemporary cyber security challenges, is the latest high-profile addition to…
Cygov Agrees Partnership With R3, Targeting Federal Suppliers

Cygov Agrees Partnership With R3, Targeting Federal Suppliers

The agreement boosts companies seeking Cybersecurity Maturity Model Certification (CMMC) certification, soon required by all Department of…
NIST 800-46: Securing Your Enterprise in the Work-From-Home Reality

NIST 800-46: Securing Your Enterprise in the Work-From-Home Reality

The COVID-19 crisis has thrown up innumerable challenges for businesses. With remote working becoming part of everyday…
Cygov Announces Strategic Partnership with Top 200 MSSP Cybriant

Cygov Announces Strategic Partnership with Top 200 MSSP Cybriant

Online PR News – 04-May-2020 – Tel Aviv – SaaS-based cyber risk platform provider CyGov announced today…
CyGov Releases Higher Education White Paper – Streamlining Risk & Reducing Workload

CyGov Releases Higher Education White Paper – Streamlining Risk & Reducing Workload

Digital technology has revolutionized the operations, administration and student-facing aspects of higher education. As universities, schools and…
CyGov and HIC Network Security Announce a Strategic Resell Partnership

CyGov and HIC Network Security Announce a Strategic Resell Partnership

CyGov is proud to announce that HIC Network Security Solutions, The Network Security Reseller, has become a…
NIST Privacy Framework – The Next Generation of Enterprise Privacy Has Arrived

NIST Privacy Framework – The Next Generation of Enterprise Privacy Has Arrived

The technology sector is constantly evolving and with it, the collection, retention and use of personal data.…
CyGov Releases Free Cyber Resilience Resource for Businesses re-Deploying Remotely

CyGov Releases Free Cyber Resilience Resource for Businesses re-Deploying Remotely

1 April (Tel Aviv) – SaaS-based cyber risk platform provider CyGov announced today that in light of…
New From CyGov - Creation of a Proprietary Cyber Resilience Resource Center

New From CyGov - Creation of a Proprietary Cyber Resilience Resource Center

In response to the epic Coronavirus threat, CyGov has created a unique cyber risk resilience management resource…
Cyber Security Best Practices for Enterprises Enabling Remote Work Locations

Cyber Security Best Practices for Enterprises Enabling Remote Work Locations

This is the first in a series of solutions that CyGov will be providing in order to…
CMMC Explained – A New Cyber Standard for DoD Contractors

CMMC Explained – A New Cyber Standard for DoD Contractors

There are several factors for government departments when it comes to selecting contractors, but cyber security is…
Shifting the Paradigm – Strategy over Technology

Shifting the Paradigm – Strategy over Technology

Does this sound familiar? Utilizing legacy security tools to protect an organization with limited budgets against an…
CCPA – How to Protect Your Business as well as Your Customers

CCPA – How to Protect Your Business as well as Your Customers

Running a company is never simple. But for companies that do business in the State of California,…
CyGov Solution Curbs Growing Risk of Supply Chain Breaches

CyGov Solution Curbs Growing Risk of Supply Chain Breaches

More than ever before, companies of all sizes are at risk of a cyber breach via their…
Eric Moseman Named VP Sales at CyGov

Eric Moseman Named VP Sales at CyGov

CyGov is excited to announce that Eric Moseman has been appointed Vice President of Sales. He will…
Skip to content