Mourne Fourie
Mourne Fourie
Mapping HIPAA to ISO 27001: A Comprehensive Guide
Two Foundational Frameworks: ISO 27001 and HIPAA With the growing number of risks in the information security…
An Introduction to the Hawaii Consumer Privacy Protection Act
Updated September 2024 Here’s an interesting fact about the Hawaii bill of rights: The Hawaii constitution lists…
PCI Audit – Checklist & Requirements
What is a PCI Audit? The Payment Card Industry Data Security Standard, known widely as PCI DSS,…
The 10 Best Compliance Podcasts You Should Listen To In 2024
Podcasts have exploded in popularity over the past several years, and it’s not difficult to see why.…
Why Use Automated Compliance Solutions in 2024
Compliance automation has never been more important as companies face frequently updated regulations and a growing cost…
Top Cybersecurity Threats to Prepare for Before 2024
Is Cyber 2024 Stuff of Movies? We often think of modern cybersecurity as a movie scene with…
What is Vendor Risk Assessment? The Definitive Guide for 2024
What are Vendor Risk Assessments? Vendor assessment is the process of assessing and identifying risks posed by…
Supply Chain Vendor Risk Assessment: The Definitive Guide
Organizations increasingly rely on third-party suppliers to support critical business functions. This upward trend has accelerated in…
Cyber Leaders of the World: Marc Johnson, CISO at Impact Advisors
Please tell us a bit about yourself, your background, and your journey of becoming a CISO at…
Immediate Actions to Reduce the Cyber Attack Surface
What Is an Attack Surface? Your “attack surface” is a susceptible area comprised of points in a…
What are the Cyber Security Risks of ChatGPT?
Chatgpt 3 Speaks For Itself The internet is so laden with content about this new wizard, there’s…
Cyber Leaders of the World: Craig Williams, CISO at Secure Data Technologies
Please tell us a bit about yourself, your background, and your journey of becoming a CISO at…
Best Ways To Make GRC Work When Budget is Tight
We’ve all seen it: Compliance teams deluged by regulatory requirements, constant red alerts about software vulnerabilities that…
SIG Security Questionnaire: Everything You Need to Know
What is the SIG Questionnaire? The SIG, short for “Standardized Information Gathering (Questionnaire)”, standardizes the assessment of…
Understanding and Applying Health Industry Cybersecurity Practices
The Health Industry Cybersecurity Practices (HICP) was created to integrate effective cybersecurity strategies into a healthcare organization’s…
Cyber Leaders of the World: Bill Genovese, CIO Advisory Partner at Kyndryl
Please tell us a bit about yourself, your background, and your journey of becoming a CIO Advisory…
What are the Implications of ChatGPT for InfoSec?
What does ChatGPT have in store for information security? Will the artificial intelligence-powered chatbot empower the information…
NIST Cybersecurity Framework 2.0: Tailoring to the Needs of Industry
The NIST CSF is Scheduled For a Makeover The NIST Cybersecurity Framework is a set of standards,…
Cyber Leaders of the World: Dr. Brian Callahan, Graduate Program Director & Lecturer at ITWS@RPI, and CISO at PECE
Please tell us a bit about yourself, your background, and your journey of becoming a CISO at…
Centraleyes Product Webinar: Cyber Insurance
Centraleyes’s dedicated Cyber Insurance solution helps onboard new clients, quantify cyber risk, and actively helps your customers…
4 Practical Risk Mitigation Techniques To Apply to Your Business
Whether you are an SMB looking for advice as to where to start with risk management or…
Using the Hierarchy of Cybersecurity Needs for Incident Response
Abraham Maslow was a humanistic psychologist, which put him in a different bucket than other psychologists you…
Cyber Leaders of the World: Chris Grundemann, Research Category Lead for Security and Risk at GigaOm
Please tell us a bit about yourself, your background, and your multiple endeavors, including your role as…
How Much Does SOC 2 Type Compliance Cost?
One of your biggest questions regarding a SOC 2 audit is whether it fits in your budget.…
The Simple Guide To Maine Privacy Law
Background of the Maine Privacy Law In 2019, Maine became the first state in the nation to…
What Are the Main Benefits of Network Access Control Solutions?
Business networks are constantly evolving, and new attack vectors emerge at an astonishing rate. Network managers need…
The Complete Guide for IRS Publication 4557 - Safeguarding Taxpayer Data
Background to the IRS Publication 4557 Data Thefts Are on the Rise in the Tax Industry. Identity…
Third Party Risk Management Software: The Essential Elements and Features
The need for TPRM Solutions Today In today’s hybrid ecosystem of cloud computing, remote employment, and global…
The ISO 27001:2022 Update - Everything You Need To Know With Changes Listed
The release of the newly revised and renamed ISO 27001:2022 has been highly anticipated, although it doesn’t…
Cyber Leaders of the World: Barak Blima, CISO at CHEQ
Please tell us a bit about yourself, your background, and how you got into the cybersecurity industry.…