Michelle Ofir Geveye
Michelle Ofir Geveye
Future of Compliance: 2024's Essential Cybersecurity Insights
Compliance Trends and Timeline for Regulations in 2024 From data security standards to privacy laws and emerging…
What Do You Do if You Have a Third-Party Data Breach
Data breaches have become an unfortunate reality in today’s digital landscape, affecting organizations of all sizes. In…
7 Steps to Measure ERM Performance
The distinction between enterprise risk management (ERM) and traditional risk management is more than semantics. The simplest…
How Do You Quantify Risk? Best Techniques
Categorizing risks as high, medium, or low has been the go-to method for organizations seeking to prioritize…
Protecting Endpoints in an Evolving Threat Landscape
Imagine your digital environment as a bustling metropolis, with every user, application, and system contributing to the…
The Goals of Security Compliance
Do you find yourself tempted to postpone your compliance duties? The sighs and eye-rolls that often accompany…
Data Privacy in the United States: A Recap of 2023 Developments
2023 marked a surge in comprehensive state data privacy laws. At the beginning of the year, only…
Introduction to the NIST AI Risk Management Framework (AI RMF)
Unlike general cybersecurity concerns, whose primary focus is thwarting threats and vulnerabilities, AI risk management introduces a…
NIS2 Framework: Your Key To Achieving Cybersecurity Excellence
With the introduction of NIS2, the European Union has moved beyond the GDPR’s focus on data protection…
Comprehensive Third-Party Risk Assessment Checklist for Robust Risk Management
Third-party partnerships require a careful balancing act to navigate the complexities inherent in external collaborations. Let’s delve…
New Jersey Privacy Act: What to Expect
The last couple of years have seen a wave of state privacy law proposals across the United…
How to Get PCI DSS Certification?
The purpose of PCI DSS is simply to ensure that all companies that accept, process, store or…
The Ultimate Guide to Selecting Integrated Risk Management Software
Many organizations tend to adopt a reactive approach to managing risks. They often wait until a high-profile…
How to Conduct a Vulnerability Assessment
Ignorance can be costly when safeguarding your cloud or hybrid networks. Today’s security teams face the challenge…
The Benefits of Employing AI in GRC
The narrative of technology surpassing human intelligence and altering the course of humanity is a recurring theme…
Understanding the Key Differences Between TPRM and GRC
Organizations face multifaceted governance, risk management, and compliance challenges in today’s dynamic business environment. These challenges necessitate…
Why a Zero Trust Security Policy Matters and Steps to Implementation
Understanding Zero Trust Traditionally, cybersecurity operated on a simple principle: trust what’s inside, be wary of what’s…
Enhancing Network Security Automation: Debunking 7 Common Myths
The dynamic security landscape presents significant challenges for organizations, especially in multi-cloud environments. The key to combating…
How Will DORA Affect the Board of Directors?
How DORA is Transforming the Management’s Role in Financial Services EU’s Digital Operational Resilience Act (DORA) ushers…
What is the Difference Between DORA and GDPR?
What is DORA? DORA, or the Digital Operational Resilience Act, marks a transformative milestone in financial regulation.…
Achieving DORA Compliance in Your Organization
What is DORA (Digital Operational Resilience Act)? DORA is a groundbreaking EU regulation designed to enhance the…
Understanding the Regulatory Technical Standards (RTS) and Implementing Technical Standards (ITS) of DORA
The financial industry eagerly awaits the release of the second batch of draft regulatory technical standards (RTS)…
Why is Threat Modeling So Important in 2024?
There’s an old saying — an ounce of prevention is worth a pound of cure. Nowhere does…
Top 5 Strategies for Vulnerability Mitigation
Whether you are an SMB looking for advice as to where to start with security vulnerability management…
Mastering the German Federal Data Protection Act (BDSG-New): A Deep Dive
On May 25, 2018, Germany entered a new era of data protection. On that day, the GDPR…
Top US State Data Privacy Laws To Watch Out For in 2024
The digital era has brought new levels of attention to the privacy debate. From big data breaches…
How Diversity and Inclusion Initiatives Can Reduce Cyber Risk
In the aftermath of the national reckoning on racial justice ignited by the tragic events involving George…
Implementing Effective Compliance Testing: A Comprehensive Guide
At the heart of every organization’s pursuit of compliance lies the critical need to meet regulatory expectations…
Top 5 Cyber Insurance Companies in the US for 2024
According to Fitch Ratings, cyber insurance is the fastest-growing type of insurance in the United States. This…
The Ultimate ESG Audits Checklist
ESG Disclosures According to the annual survey of sustainability professionals conducted by WSJ Pro in the spring…