Mapping HIPAA to ISO 27001: A Comprehensive Guide

Mapping HIPAA to ISO 27001: A Comprehensive Guide

Two Foundational Frameworks: ISO 27001 and HIPAA With the growing number of risks in the information security…
An Introduction to the Hawaii Consumer Privacy Protection Act

An Introduction to the Hawaii Consumer Privacy Protection Act

Updated September 2024 Here’s an interesting fact about the Hawaii bill of rights: The Hawaii constitution lists…
PCI Audit – Checklist & Requirements

PCI Audit – Checklist & Requirements

What is a PCI Audit? The Payment Card Industry Data Security Standard, known widely as PCI DSS,…
The 10 Best Compliance Podcasts You Should Listen To In 2024

The 10 Best Compliance Podcasts You Should Listen To In 2024

Podcasts have exploded in popularity over the past several years, and it’s not difficult to see why.…
Why Use Automated Compliance Solutions in 2024

Why Use Automated Compliance Solutions in 2024

Compliance automation has never been more important as companies face frequently updated regulations and a growing cost…
Top Cybersecurity Threats to Prepare for Before 2024

Top Cybersecurity Threats to Prepare for Before 2024

Is Cyber 2024 Stuff of Movies? We often think of modern cybersecurity as a movie scene with…
What is Vendor Risk Assessment? The Definitive Guide for 2024

What is Vendor Risk Assessment? The Definitive Guide for 2024

What are Vendor Risk Assessments? Vendor assessment is the process of assessing and identifying risks posed by…
Supply Chain Vendor Risk Assessment: The Definitive Guide

Supply Chain Vendor Risk Assessment: The Definitive Guide

Organizations increasingly rely on third-party suppliers to support critical business functions. This upward trend has accelerated in…
Cyber Leaders of the World: Marc Johnson, CISO at Impact Advisors

Cyber Leaders of the World: Marc Johnson, CISO at Impact Advisors

Please tell us a bit about yourself, your background, and your journey of becoming a CISO at…
Immediate Actions to Reduce the Cyber Attack Surface

Immediate Actions to Reduce the Cyber Attack Surface

What Is an Attack Surface? Your “attack surface” is a susceptible area comprised of points in a…
What are the Cyber Security Risks of ChatGPT?

What are the Cyber Security Risks of ChatGPT?

Chatgpt 3 Speaks For Itself The internet is so laden with content about this new wizard, there’s…
Cyber Leaders of the World: Craig Williams, CISO at Secure Data Technologies

Cyber Leaders of the World: Craig Williams, CISO at Secure Data Technologies

Please tell us a bit about yourself, your background, and your journey of becoming a CISO at…
Best Ways To Make GRC Work When Budget is Tight 

Best Ways To Make GRC Work When Budget is Tight 

We’ve all seen it: Compliance teams deluged by regulatory requirements, constant red alerts about software vulnerabilities that…
SIG Security Questionnaire: Everything You Need to Know

SIG Security Questionnaire: Everything You Need to Know

What is the SIG Questionnaire? The SIG, short for “Standardized Information Gathering (Questionnaire)”, standardizes the assessment of…
Understanding and Applying Health Industry Cybersecurity Practices

Understanding and Applying Health Industry Cybersecurity Practices

The Health Industry Cybersecurity Practices (HICP) was created to integrate effective cybersecurity strategies into a healthcare organization’s…
Cyber Leaders of the World: Bill Genovese, CIO Advisory Partner at Kyndryl

Cyber Leaders of the World: Bill Genovese, CIO Advisory Partner at Kyndryl

Please tell us a bit about yourself, your background, and your journey of becoming a CIO Advisory…
What are the Implications of ChatGPT for InfoSec?

What are the Implications of ChatGPT for InfoSec?

What does ChatGPT have in store for information security?  Will the artificial intelligence-powered chatbot empower the information…
NIST Cybersecurity Framework 2.0: Tailoring to the Needs of Industry

NIST Cybersecurity Framework 2.0: Tailoring to the Needs of Industry

The NIST CSF is Scheduled For a Makeover The NIST Cybersecurity Framework is a set of standards,…

Centraleyes Product Webinar: Cyber Insurance

Centraleyes’s dedicated Cyber Insurance solution helps onboard new clients, quantify cyber risk, and actively helps your customers…
4 Practical Risk Mitigation Techniques To Apply to Your Business

4 Practical Risk Mitigation Techniques To Apply to Your Business

Whether you are an SMB looking for advice as to where to start with risk management or…
Using the Hierarchy of Cybersecurity Needs for Incident Response

Using the Hierarchy of Cybersecurity Needs for Incident Response

Abraham Maslow was a humanistic psychologist, which put him in a different bucket than other psychologists you…
Cyber Leaders of the World: Chris Grundemann, Research Category Lead for Security and Risk at GigaOm

Cyber Leaders of the World: Chris Grundemann, Research Category Lead for Security and Risk at GigaOm

Please tell us a bit about yourself, your background, and your multiple endeavors, including your role as…
How Much Does SOC 2 Type Compliance Cost?

How Much Does SOC 2 Type Compliance Cost?

One of your biggest questions regarding a SOC 2 audit is whether it fits in your budget.…
The Simple Guide To Maine Privacy Law

The Simple Guide To Maine Privacy Law

Background of the Maine Privacy Law In 2019, Maine became the first state in the nation to…
What Are the Main Benefits of Network Access Control Solutions?

What Are the Main Benefits of Network Access Control Solutions?

Business networks are constantly evolving, and new attack vectors emerge at an astonishing rate. Network managers need…
The Complete Guide for IRS Publication 4557 - Safeguarding Taxpayer Data

The Complete Guide for IRS Publication 4557 - Safeguarding Taxpayer Data

Background to the IRS Publication 4557 Data Thefts Are on the Rise in the Tax Industry. Identity…
Third Party Risk Management Software: The Essential Elements and Features

Third Party Risk Management Software: The Essential Elements and Features

The need for TPRM Solutions Today In today’s hybrid ecosystem of cloud computing, remote employment, and global…
The ISO 27001:2022 Update - Everything You Need To Know With Changes Listed

The ISO 27001:2022 Update - Everything You Need To Know With Changes Listed

The release of the newly revised and renamed ISO 27001:2022 has been highly anticipated, although it doesn’t…
Cyber Leaders of the World: Barak Blima, CISO at CHEQ

Cyber Leaders of the World: Barak Blima, CISO at CHEQ

Please tell us a bit about yourself, your background, and how you got into the cybersecurity industry.…
Skip to content