Centraleyes Resource Center

Media

Whitepapers

Insurance

Insurance

In recent years, insurance companies have gone through a digital transformation process, improving their portfolio offerings and…
Financial Institutions

Financial Institutions

In the financial services industry, data security is more essential than ever. Institutions have migrated to online…
Life Science

Life Science

In recent years, as digital health solutions became more prevalent and in-demand, Life Science institutions have become…
Higher Education

Higher Education

Over the years, academic institutions adopted many new and advanced digital and technological solutions to provide staff,…

Platform Feature Reviews

Enhance Your Cyber Maturity With ITSM Integration and Automated Remediation

Enhance Your Cyber Maturity With ITSM Integration and Automated Remediation

Centraleyes makes your data actionable and enhances your cyber maturity by automatically creating remediation workflows whenever a…
Ensure Your Ongoing Compliance With Automatic Framework Reassessment Tasks

Ensure Your Ongoing Compliance With Automatic Framework Reassessment Tasks

Periodically reassessing your frameworks can be crucial to ensure your ongoing compliance and risk posture. With Centraleyes…
Stay in the Know With a Full Activity Log of Your Assessment Collection

Stay in the Know With a Full Activity Log of Your Assessment Collection

The Centraleyes platform offers a full audit trail of all of the activities contained within your assessments,…
Add a New Entity to Perform Your Assessment in 10 Seconds

Add a New Entity to Perform Your Assessment in 10 Seconds

Creating a new entity in the Centraleyes Multi-Entity 1st Party module provides you with another layer of…

Cyber Leaders Publication

Cyber Leaders of the World: Chris Lockery, CISO at Help at Home

Cyber Leaders of the World: Chris Lockery, CISO at Help at Home

Please tell us a bit about yourself, your background, and your journey of becoming a CISO at…
Cyber Leaders of the World: Michael Anderson, CISO at the Dallas Independent School District

Cyber Leaders of the World: Michael Anderson, CISO at the Dallas Independent School District

Please tell us about yourself, your background, and your journey of becoming a CISO for the Dallas…
Cyber Leaders of the World: Timothy Spear, Co-Founder and CTO of Whonome

Cyber Leaders of the World: Timothy Spear, Co-Founder and CTO of Whonome

Please tell us a bit about yourself, your background, and your journey of becoming a co-founder and…
Cyber Leaders of the World: Marc Johnson, CISO at Impact Advisors

Cyber Leaders of the World: Marc Johnson, CISO at Impact Advisors

Please tell us a bit about yourself, your background, and your journey of becoming a CISO at…

News and Updates

Microsoft Responsible for Made-in-China Hack that Targeted US Officials

Microsoft Responsible for Made-in-China Hack that Targeted US Officials

A US government-backed investigation has determined that a China-sourced hack last year that infiltrated Microsoft’s networks and,…
AI Gets an Endorsement from Coalition

AI Gets an Endorsement from Coalition

Coalition, a leader in cyber insurance, has added a positive endorsement for artificial intelligence (AI) to its…
NIST NVD "Under Construction"

NIST NVD "Under Construction"

In recent weeks, NIST’s National Vulnerability Database (NVD) has been experiencing a slowdown. Since February 15, 2024,…
TutaCrypt to Thwart 'Harvest Now, Decrypt Later' Attacks

TutaCrypt to Thwart 'Harvest Now, Decrypt Later' Attacks

Tuta Mail introduced TutaCrypt, a protocol engineered to bring email encryption into the post-quantum era. Tuta Mail…

On-Demand Webinars

How to Build a Successful GRC Program to Help Reduce Your Risk Posture

How to Build a Successful GRC Program to Help Reduce Your Risk Posture

Watch this special, collaborated webinar session where Sagar Shah, Senior Manager of GRC at Corvus Insurance, and Yair Solow,…
How to Stay Secure and Compliant in a World of Regulatory turmoil

How to Stay Secure and Compliant in a World of Regulatory turmoil

Watch this special, collaborated webinar session where industry experts from Netsurit and Centraleyes meet at an intriguing…
Don’t Keep Your Head in the Clouds – How to Protect Yourself from Virtual Risk

Don’t Keep Your Head in the Clouds – How to Protect Yourself from Virtual Risk

In todays world where many organizations have adopted and migrated most of their activity to the cloud,…
Flash Webinar: How to Know When it's Time to Build a Risk Management Program

Flash Webinar: How to Know When it's Time to Build a Risk Management Program

Companies in hyper growth mode as well as mid-market enterprises are often focused on product development and…

Blog

Understanding the Different Types of Audit Evidence

Understanding the Different Types of Audit Evidence

Audit evidence lies at the heart of cybersecurity audits and assessments, providing tangible proof of an organization’s…
Data Loss Prevention: Best Practices for Secure Data Management

Data Loss Prevention: Best Practices for Secure Data Management

The stakes for safeguarding sensitive information have never been higher. Cyber Data loss can lead to severe…
What is Maryland’s Online Data Privacy Protection Act?

What is Maryland’s Online Data Privacy Protection Act?

Maryland Takes the Lead in Privacy Legislation with Comprehensive MODPA The Maryland legislature enacted two comprehensive privacy…
Enhancing Security and Reducing Costs with Advanced Zero Trust Implementation

Enhancing Security and Reducing Costs with Advanced Zero Trust Implementation

Traditional methods no longer suffice to protect sensitive data from modern threats. Conventional strategies relied on fortress-like…

Cyber Leaders

Cyber Leaders of the World: Chris Lockery, CISO at Help at Home

Cyber Leaders of the World: Chris Lockery, CISO at Help at Home

Please tell us a bit about yourself, your background, and your journey of becoming a CISO at…
Cyber Leaders of the World: Michael Anderson, CISO at the Dallas Independent School District

Cyber Leaders of the World: Michael Anderson, CISO at the Dallas Independent School District

Please tell us about yourself, your background, and your journey of becoming a CISO for the Dallas…
Cyber Leaders of the World: Timothy Spear, Co-Founder and CTO of Whonome

Cyber Leaders of the World: Timothy Spear, Co-Founder and CTO of Whonome

Please tell us a bit about yourself, your background, and your journey of becoming a co-founder and…
Cyber Leaders of the World: Marc Johnson, CISO at Impact Advisors

Cyber Leaders of the World: Marc Johnson, CISO at Impact Advisors

Please tell us a bit about yourself, your background, and your journey of becoming a CISO at…

Glossary

Questions

Guides

Generative AI is a transformative force, pushing the boundaries… More

Integrate industry standards and best practices to manage your… More

Attending conferences is a great way to stay current in your industry and connect… More

Third party risk management (TPRM) is the management of the risks… More

Skip to content