
Michelle Ofir Geveye

Michelle Ofir Geveye
Best Practices for Automating Third-Party Risk Management
Businesses are increasingly relying on third-party vendors to support their operations. As corporate networks grow beyond traditional…
How Security Automation Works
Organizations face an ever-growing array of cyber challenges. The traditional manual approaches to security are no longer…
Federal Privacy Legislation: What You Need to Know
While the Internet offers consumers a veritable wealth of information, goods, and services, it is also a…
Google-Owned VirusTotal Data Leak: Result of Human Error
The recent data leak at Google-owned VirusTotal exposed information on approximately 5,600 of its registered customers. The…
Cyber Risk Management as a Best Practice: Benefits to Financial Firms
According to BitSight, the financial services industry is a high-value target for threat actors. Firms in this…
Cyber Leaders of the World: Michael Anderson, CISO at the Dallas Independent School District
Please tell us about yourself, your background, and your journey of becoming a CISO for the Dallas…
Selecting the Best Cyber Risk Quantification Models for Your Organization
Quantitative risk analysis refers to a numeric projection of the total impact of a given risk on…
Security Audit Benefits for Small Businesses
What is a Security Audit? A cyber security audit is like a health checkup for an organization’s…
Benefits of Information Security Automation
What is Information Security Automation? Security automation refers to the use of technology and tools to automate…
Crafting a Successful Cybersecurity Risk Management Strategy
In a world where cyber risks lurk in the dark shadows of our networks, one thing is…
How to Show the Efficiency of a Vulnerability Management Program
What is Vulnerability Management? Vulnerability management is a critical element of information security. With cyber-attacks and data…
Important Features of a Digital Risk Protection Service
What is Digital Risk? Digital risk is the term for the negative effects that result from implementing…
Automated Regulatory Compliance Management - Key Reasons to Implement Immediately
Introduction For almost any business, being compliant with regulations is an important part of operating efficiently. However,…
How ISO Standards Address Third-party Risk Management
ISO is one of the most widely used vendor risk management frameworks. Certification to ISO/IEC 27001 is…
Cyber Leaders of the World: Timothy Spear, Co-Founder and CTO of Whonome
Please tell us a bit about yourself, your background, and your journey of becoming a co-founder and…
Student Data Privacy: Balancing Privacy and Innovation
Privacy a Growing Risk for Students Along with this explosion in the growth of online learning tools…
Vendor Management Best Practices for Lasting Success
What is Vendor Risk Management? Managing the risks posed by the large network of vendors associated with…
Preparing for the Future of EdTech Security: What Companies Need to Know
What is EdTech? Short for education technology, EdTech includes applications and digital technology used in primary, secondary,…
Texas Privacy and Security Act: Key Points
And Then There Were Ten The Texas Data Privacy and Security Act (HB4) was approved by the…
High-profile Data Breaches: the Controls That Could Protect You
Data breaches can have far-reaching financial and reputational impacts on your business. Without proper attention to detail…
Cyber Leaders of the World: Andrew Dutton, Virtual CISO at DuHart Consulting
Please tell us a bit about yourself, your background, and your journey of becoming a Virtual CISO…
NIST 800-171 Revision 3: The Impact on CMMC Compliance and How To Get Ready
If you are a company that holds a contract with the DoD and handles CUI, you are…
Centraleyes Central Class: Mastering Cyber Risk and Compliance Management - Best Practices and Solutions
Watch this Central Class session to learn how you can streamline your cyber risk and compliance management.…
How to Prepare for Montana Consumer Data Privacy Law
They’re Coming Fast and Furious! On April 21, 2023, the Montana Consumer Data Privacy Act (MCDPA) passed…
Everything You Need to Know About the Tennessee Consumer Data Privacy Law
First Same-Date Privacy Laws Tennessee and Montana just passed privacy laws on the same date, April 21,…
What Indiana State Data Privacy Law Means for Your Company
Last week, Senate Bill 5 passed unanimously in The Indiana House with a definitive 98-0 vote. The…
Centraleyes Launches the First of its Kind Higher-Ed Cyber Risk Program in Collaboration with FSU
The key objective is to bring hands-on training and experience on best practices and the key role…
Iowa Passes Data Privacy Law: What You Need to Know to Be Compliant
Iowa joined the privacy club last week when it passed a comprehensive consumer data privacy law, officially…
Centraleyes Product Webinar: Next Gen GRC - 3rd-Party Vedor Risk Management
Does the term GRC make you cringe? Do you find yourself procrastinating any task related to risk,…
Understanding Qualitative and Quantitative Risk Analysis in Definitive
Calculating risk is similar to attempting to forecast the future; you won’t always be accurate, but with…