Centraleyes’s Resource Center
Centraleyes Provides You With Various Resources
On the Different Industries And Services
Resources | Platform Feature Reviews
Enhance Your Cyber Maturity With ITSM Integration and Automated Remediation
Centraleyes makes your data actionable and enhances your cyber maturity by automatically creating remediation workflows whenever a…
Ensure Your Ongoing Compliance With Automatic Framework Reassessment Tasks
Periodically reassessing your frameworks can be crucial to ensure your ongoing compliance and risk posture. With Centraleyes…
Stay in the Know With a Full Activity Log of Your Assessment Collection
The Centraleyes platform offers a full audit trail of all of the activities contained within your assessments,…
Add a New Entity to Perform Your Assessment in 10 Seconds
Creating a new entity in the Centraleyes Multi-Entity 1st Party module provides you with another layer of…
Quantify Financial Risk With Centraleyes Platform Primary Loss Calculator
Quantifying financial risk when it comes to risk management is quite difficult task. One of the most…
Cover Your Entire Environment With Centraleyes's Risk Application Assessments
The Centraleyes platform can be leveraged to run application assessments for various apps and software that are…
Communicate Cyber Risk With Your Executives in an Intuitive, Beautifully Visualized Board Reporting
The Centraleyes Boardview module is a game-changer in Executive Reporting! The platform allows you to create faster,…
Stay on Top of Your Vendors' Cyber History With In-Depth External Scans
The Centraleyes platform offers a source of automated intelligence data feeds, which complements the self-attestation collection made…
Automate the Creation and Maintenance of a Risk Register, Saving Hours on Manual Work
Centraleyes’s one-of-its-kind Automated Risk Register is the latest unique capability released in the platform’s cutting-edge, automated tools…
Add a New Framework and Distribute Assessments in Your Organization
Adding a new framework to an organization with the Centraleyes platform can be done with the click…
View Your Organization's Risk Scoring Through the NIST Tiering Lens
In our latest Centraleyes release we’ve added a NIST Tiering capability to the platform, which allows you…
Most Intuitive Way for Compliance With the Framework Navigation Tool
The Centraleyes platform has a unique breakdown screen that allows you to navigate through different frameworks in…
Always Prepared for the Next Task With Automated Remediation
The Centraleyes platform enables you to automatically collect, analyze and identify gaps. Once the gaps are identified,…
Effective Team Work With Drag-and-Drop Control Assignment
The Centraleyes platform gives you the ability to assign a specific question to one or multiple users…
Get Real-Time Critical Alerts That are Specifically Relevant to You
Centraleyes’s Critical Alerts Feed provides ongoing, real-time intelligence on new threats, vulnerabilities and regulations. This highly impactful…
MSSPs Can Manage Multiple Clients Under One Platform
Centraleyes is the only company in the world that has created a dedicated solution for Service Providers.…
Onboard a New Vendor in Just 30 Seconds
Onboarding new vendors to your Vendor Risk Assessment could take hours of work if not days due…
Turn Hours of Work Into Seconds with Centraleyes Vendor Risk Profile
When conducting vendor risk management it is important to create a risk profile on each and every…
Always Informed with Centraleyes Domain Benchmarking
When running risk management in your organization there is a tremendous amount of data points for collecting…
- Yair Solow on CNN
- Yair Solow on i24 News
- Yair Solow Featured on Bugy's Founder Interviews
- Centraleyes Chosen as Global Top 5 Startups of the Year - Interview
- Spotlight Q&A with Centraleyes at Safety Detectives
- Centraleyes on Cyber Ghost: Interview with Yair Solow
- New Centraleyes 4th Generation Release Officially Goes Live
- Yair Solow Featured on VPN Mentor
- CyGov Signs a Strategic Agreement with R3 (Spanish)
- Centraleyes Welcomes Co-Founder of Optiv, Dan Burns, to Its Board of Directors
- Centraleyes Continues to Expand Its Global Network of Strategic Partners with UK-based ITC Secure
- Centraleyes Introduces First Automated Risk Register
- Yair Solow Featured on Website Planet
- Trevor Failor named head of sales at CyGov
- CyGov is rebranding its platform as Centraleyes
- Cybersecurity Company Cygov Partners With Risk Management Company Foresight
- CyGov agrees strategic partnership with top 200 MSSP Cybriant
- Cyber Resilience Resource for Businesses Re-Deploying Remotely
- The Four New Pillars of Corporate Protection Yair Solow on InfoSecurity Magazine
- CyGov selected by SixThirty as Top Cyber Security Startup
- Europe's Top Cyber Security Startups
- Centraleyes Expands Automated Risk Register To Cover All Enterprise Risk
- CyGov Interviewed by MediaSet
- Eli Ben Meir's article in Security Intelligence
- CyGov Selected by WorldBank
- Eli Ben Meir OpEd in the Houston Chronicle
- Yair Solow and Eli Ben Meir Present at the SparkLabs Demoday 8
- Enhance Your Cyber Maturity With ITSM Integration and Automated Remediation
- Ensure Your Ongoing Compliance With Automatic Framework Reassessment Tasks
- Stay in the Know With a Full Activity Log of Your Assessment Collection
- Add a New Entity to Perform Your Assessment in 10 Seconds
- Quantify Financial Risk With Centraleyes Platform Primary Loss Calculator
- Cover Your Entire Environment With Centraleyes's Risk Application Assessments
- Communicate Cyber Risk With Your Executives in an Intuitive, Beautifully Visualized Board Reporting
- Stay on Top of Your Vendors' Cyber History With In-Depth External Scans
- Automate the Creation and Maintenance of a Risk Register, Saving Hours on Manual Work
- Add a New Framework and Distribute Assessments in Your Organization
- View Your Organization's Risk Scoring Through the NIST Tiering Lens
- Most Intuitive Way for Compliance With the Framework Navigation Tool
- Always Prepared for the Next Task With Automated Remediation
- Effective Team Work With Drag-and-Drop Control Assignment
- Get Real-Time Critical Alerts That are Specifically Relevant to You
- MSSPs Can Manage Multiple Clients Under One Platform
- Onboard a New Vendor in Just 30 Seconds
- Turn Hours of Work Into Seconds with Centraleyes Vendor Risk Profile
- Always Informed with Centraleyes Domain Benchmarking
- Drop in Ransomware Payments Show Victims Becoming Bold
- POC of CWP Flaw Leads to Live Attacks
- What Can’t You Do With Chat GPT?
- Google Sued Again For Deceptive Location Tracking
- LastPass Attacker Did Reach Password Vaults
- Game Over for Epic
- 96% of Classroom Apps Share Student’s Personal Data
- Will the FBI Block Tik Tok?
- Massive Twitter Leak
- World Cup Cyber
- FTX Has Been Hacked
- Insurance Giant Settles Groundbreaking Lawsuit with Oreo Cookie Brand Mondelez
- White House Convenes Ransomware Summit
- FBI Warns of Iranian Hacking Group Ahead of Elections
- Verizon Verifies Data Breach
- Nullmixer Malware Madness
- Uber: MFA Bombing Attack
- Twitter: Don’t Shut Down- Get Better!
- Education Hit Hard by Ransomware
- Third-party Services Breached for 2.5 million Loan Application Records!
- Credential Stuffing via Residential Proxy is on the Rise!
- Meraki Firewall False Positive Triggers Microsoft 365 Outage
- Vendor Breach at Idaho Hospital
- CosmicStrand: Getting Down to the Root of the Problem
- 4 “High Impact” Security Risks for Okta
- Phishing for Credentials
- Healthcare Data DominoesÂ
- ToddyCat APT Aims High
- Interpol Takes Down 2000 Social Engineers
- Centraleyes Goes Live with Dedicated Risk Framework for Small Business Based on NIST 7621
- Centraleyes Goes Live with the Latest Version of ISO 27001 2022 Standard
- Centraleyes Announces the Addition of NIST 800-53 to its Expanding Framework Library
- Centraleyes Adds the HECVAT Risk Assessment to its Expanding Framework Library
- Centraleyes Maps the FFIEC to its Expanding Control Inventory
- Centraleyes Announces the Addition of NYDFS to its Expanding Framework Library
- Centraleyes Maps PCI DSS to its Expanding Control Inventory
- Centraleyes Adds ISO 22301 to its Extensive Framework Library
- Centraleyes Integrates the South African Protection of Personal Information Act with its GRC Platform
- Keep China Out: Patch Network Devices ASAP
- Centraleyes Adds the Secure Controls Framework to its Expanding Framework Library
- How to Build a Successful GRC Program to Help Reduce Your Risk Posture
- How to Stay Secure and Compliant in a World of Regulatory turmoil
- Don’t Keep Your Head in the Clouds – How to Protect Yourself from Virtual Risk
- Flash Webinar: How to Know When it's Time to Build a Risk Management Program
- Enhancing Cyber Risk Management Through the Power of Automation - Boutique Webinar
- Flash Webinar: From Technical to Business Risk - How to Communicate With Your Board
- Flash Webinar: What You Can Learn From the SolarWinds Attack to Lower Your Chances of Being Breached
- Flash Webinar: Supply Chain, 3rd-Party Vendors and the Silent Assassin Among Them
- Flash Webinar: Cyber Risk Management - it Doesn't Have to Be So Painful
- New Jersey Privacy Act: What to Expect
- What is Cybersecurity Risk Posture and Why Do I Need It?
- What is the California Privacy Rights Act (CPRA)?
- Compliance Audit Trails: Why They're So Important
- What is Vendor Risk Assessment? The Definitive Guide for 2023
- Preparing for ISO 27002:2022 - What Do the Changes Mean for You?
- Cyber Risk Dashboard: The Metrics That Have Value for the Board of Directors
- The Importance of a Remote Access Policy
- Best Ways to Reduce Compliance Costs and Still Stay Compliant
- Top Cybersecurity Threats to Prepare for Before 2023
- Supply Chain Risk Management Explained
- The Full NIST 800 53 Checklist: How to Prepare for an Audit
- What is the NIST 7621 Cybersecurity Framework, and How Can it Help Small Businesses?
- Integrated Risk Management Software: A Complete Guide
- Virginia Consumer Data Protection Act: The Most Important Things to Know About
- Common Types of Network Security Attacks and How to Prevent Them in Your Enterprise
- What is the Underlying Theory Behind the Zero Trust Security Model?
- Why Use Automated Compliance Solutions in 2023
- Steps to Identify Controlled Unclassified Information and Protect It
- What's New in CIS Controls v8?
- Utah Consumer Privacy Act: What Do Businesses Need To Know
- Why Spreadsheets Don’t Work for Managing Risk Assessments
- Colorado Privacy Act Signed Into Law: What You Need to Know
- How To Perform a Successful GRC Gap Analysis
- How to Manage Company Compliance During Recession: Complete Checklist
- New Data Privacy Law: Steps Organizations Should Take to Update Their Data Inventory for 2023
- 7 Steps to Accelerate Your Cyber Risk Remediation Initiative
- The Problem With Heat Maps
- Continuous Control Monitoring: Why is it So Important?
- Struggling to Fix Cyber Governance? Here Are the Most Powerful Strategies
- Pros and Cons of Continuous Compliance Solutions
- Cloud Compliance: Best Practices for Success
- Guide to Cloud Security Risk Management
- Cyber Risk Quantification
- Risk Quantification: Why Quantifying Is Only the First Step to Effective Risk Management
- The Difference Between Due Diligence and Due Care in Cybersecurity
- The Ongoing Need for Cyber Insurance
- Managing 4th Party Risk in Your Enterprise: A Step by Step Guide
- A GRC Framework: 5 Tips for Building a Successful One
- Inflation Impacts Cyber Data-Loss: Here’s What You Need to Know
- Cyber Leaders of the World: Tony Velleca, CEO at CyberProof and CISO at UST
- Cyber Leaders of the World: Rob Black, CEO and Founder of Fractional CISO
- Cyber Leaders of the World: Zachary Lewis, CISO at the University of Health Sciences and Pharmacy in St. Louis
- Cyber Leaders of the World: Dan Wilkins, CISO at the State of Arizona
- Cyber Leaders of the World: Sagar Narasimha, CISO at Amagi
- Cyber Leaders of the World: Seema Sharma, Global Head of Information Security & Data Privacy at Servify
- Cyber Leaders of the World: Shay Siksik, VP of Customer Experience at XM Cyber
- Cyber Leaders of the World: Raz Karmi, CISO at SimilarWeb
- Proactive Risk Management
- Corporate Security Audit
- SOC Trust Services Criteria
- Risk Prioritization
- Vendor Assessment
- Automated Risk Assessment
- IT General Controls
- Cyber Security Risk Register
- Cyber Risk Score
- Risk-Based Security
- Cyber Security Ratings
- Common Vulnerability Scoring System (CVSS)
- Attribute-Based Access Control (ABAC)
- Access Control Policy
- Security Orchestration
- Cyber Risk Remediation
- ESG Frameworks
- FAIR Training
- Cybersecurity Architecture
- Risk Management Maturity
- Crosswalking Controls
- Attestation of Compliance (AoC)
- Cyber Attack Vector
- Information Security Governance
- Operational Resilience
- Digital Risk Management
- EDR Solutions
- Cyber Threat Modeling
- Information Security Management System (ISMS)
- GRC Tools
- Cybersecurity Posture
- Cybersecurity Maturity Model Certification (CMMC)
- Cybersecurity Audit
- Information Security Risk
- Supply Chain Compliance
- Compliance Automation Software
- Cybersecurity Risk Analysis
- IT Vendor Risk Management
- Cybersecurity Performance Management
- Cybersecurity Incident Disclosure
- What are the Elements of an IRS Data Security Plan?
- What Are the Primary Components of Vendor Risk Management?
- How Do You Create a Data Classification Policy?
- What are the Steps in a Vendor Management Audit?
- Why Do CISOs Need to Quantify Cyber Risk?
- What Are the 4 Common Causes of Data Breaches?
- What Are Examples of Reputational Risks?
- What Can be Monitored with CCM?
- How Can Finance Companies Manage Vendor Risk?
- What are the 4 Steps of the Vulnerability Remediation Process?
- Do Any Laws Apply to Typosquatting and Cybersquatting?
- How do you implement the NIST cybersecurity framework using ISO 27001?
- How long does it take to get SOC 2 compliance?
- Why is due diligence necessary when dealing with external vendors?
- What should be included in an incident response plan?
- What is the purpose of cyber security insurance?
- How to Develop Internal Controls to Mitigate IT Security Risks
- How is the GDPR affecting cyber risk management?
- What is the Cyber Supply Chain Risk Assessment Process?
- How do we build a privacy program?
- How Do You Evaluate Cybersecurity Risk?
- What are Cyber Security Risks in Retail?
- What Are the 5 Steps Toward HIPAA Compliance?
- What Are POA&Ms Used For?
- How to Implement ISO 27001 Controls?
- What is an Enterprise Vendor Risk Management Program?
- What is an integrated risk management (IRM) approach for a company?
- Why is third-party risk management important?
- How do you Perform a Vendor Risk Assessment?
- Last Resources
CIS Controls
June 14, 2021
Secure Controls Framework (SCF)
May 30, 2022
OWASP ASVS
June 14, 2021
CCPA
June 14, 2021
GDPR
June 14, 2021
NY SHIELD Act
June 14, 2021
ISO 27701
June 14, 2021
ISO 27001
June 14, 2021
PCI DSS
June 14, 2021
SOC 2 Type II
June 14, 2021
FFIEC
June 14, 2021

Drop in Ransomware Payments Show Victims Becoming Bold
January 26, 2023

New Jersey Privacy Act: What to Expect
January 26, 2023

What is Cybersecurity Risk Posture and Why Do I Need It?
January 23, 2023