PCI Audit – Checklist & Requirements

PCI Audit – Checklist & Requirements

What is a PCI Audit? The Payment Card Industry Data Security Standard, known widely as PCI DSS,…
The 10 Best Compliance Podcasts You Should Listen To In 2024

The 10 Best Compliance Podcasts You Should Listen To In 2024

Podcasts have exploded in popularity over the past several years, and it’s not difficult to see why.…
Why Use Automated Compliance Solutions in 2024

Why Use Automated Compliance Solutions in 2024

Compliance automation has never been more important as companies face frequently updated regulations and a growing cost…
Top Cybersecurity Threats to Prepare for Before 2024

Top Cybersecurity Threats to Prepare for Before 2024

Is Cyber 2024 Stuff of Movies? We often think of modern cybersecurity as a movie scene with…
What is Vendor Risk Assessment? The Definitive Guide for 2024

What is Vendor Risk Assessment? The Definitive Guide for 2024

What are Vendor Risk Assessments? Vendor assessment is the process of assessing and identifying risks posed by…
Supply Chain Vendor Risk Assessment: The Definitive Guide

Supply Chain Vendor Risk Assessment: The Definitive Guide

Organizations increasingly rely on third-party suppliers to support critical business functions. This upward trend has accelerated in…
Cyber Leaders of the World: Marc Johnson, CISO at Impact Advisors

Cyber Leaders of the World: Marc Johnson, CISO at Impact Advisors

Please tell us a bit about yourself, your background, and your journey of becoming a CISO at…
Immediate Actions to Reduce the Cyber Attack Surface

Immediate Actions to Reduce the Cyber Attack Surface

What Is an Attack Surface? Your “attack surface” is a susceptible area comprised of points in a…
What are the Cyber Security Risks of ChatGPT?

What are the Cyber Security Risks of ChatGPT?

Chatgpt 3 Speaks For Itself The internet is so laden with content about this new wizard, there’s…
Cyber Leaders of the World: Craig Williams, CISO at Secure Data Technologies

Cyber Leaders of the World: Craig Williams, CISO at Secure Data Technologies

Please tell us a bit about yourself, your background, and your journey of becoming a CISO at…
Best Ways To Make GRC Work When Budget is Tight 

Best Ways To Make GRC Work When Budget is Tight 

We’ve all seen it: Compliance teams deluged by regulatory requirements, constant red alerts about software vulnerabilities that…
SIG Security Questionnaire: Everything You Need to Know

SIG Security Questionnaire: Everything You Need to Know

What is the SIG Questionnaire? The SIG, short for “Standardized Information Gathering (Questionnaire)”, standardizes the assessment of…
Understanding and Applying Health Industry Cybersecurity Practices

Understanding and Applying Health Industry Cybersecurity Practices

The Health Industry Cybersecurity Practices (HICP) was created to integrate effective cybersecurity strategies into a healthcare organization’s…
Cyber Leaders of the World: Bill Genovese, CIO Advisory Partner at Kyndryl

Cyber Leaders of the World: Bill Genovese, CIO Advisory Partner at Kyndryl

Please tell us a bit about yourself, your background, and your journey of becoming a CIO Advisory…
What are the Implications of ChatGPT for InfoSec?

What are the Implications of ChatGPT for InfoSec?

What does ChatGPT have in store for information security?  Will the artificial intelligence-powered chatbot empower the information…
NIST Cybersecurity Framework 2.0: Tailoring to the Needs of Industry

NIST Cybersecurity Framework 2.0: Tailoring to the Needs of Industry

The NIST CSF is Scheduled For a Makeover The NIST Cybersecurity Framework is a set of standards,…
Cyber Leaders of the World: Dr. Brian Callahan, Graduate Program Director & Lecturer at ITWS@RPI, and CISO at PECE

Cyber Leaders of the World: Dr. Brian Callahan, Graduate Program Director & Lecturer at ITWS@RPI, and CISO at PECE

Please tell us a bit about yourself, your background, and your journey of becoming a CISO at…
Mapping HIPAA to ISO 27001: A Comprehensive Guide

Mapping HIPAA to ISO 27001: A Comprehensive Guide

Two Foundational Frameworks: ISO 27001 and HIPAA With the growing number of risks in the information security…

Centraleyes Product Webinar: Cyber Insurance

Centraleyes’s dedicated Cyber Insurance solution helps onboard new clients, quantify cyber risk, and actively helps your customers…
4 Practical Risk Mitigation Techniques To Apply to Your Business

4 Practical Risk Mitigation Techniques To Apply to Your Business

Whether you are an SMB looking for advice as to where to start with risk management or…
Skip to content