How to Prevent IOT Security Threats

The Importance of Building a Security Program for IoT We live in an age of “smart” everything, from smartphones to smart televisions. Even our alarm systems and printers are connected to the Internet, remotely accessible with just the touch of a few buttons. This added convenience creates added security risks, as Sony discovered when hackers...

GDPR Compliance | A Data Privacy Program is Necessary

The Key to Ensuring GDPR Compliance? A Data Privacy Program.  If your organization does business in Europe or works with European clients, you may be aware of the EU’s work to create a standardized set of data protection regulations. This framework, known as GDPR (General Data Protection Regulation) gives individuals greater control over their personal...

CISO Suggestions for the Equifax Breach [One-Page Facts Sheet Included]

CISO Suggestions for the Equifax Breach By now, most people are somewhat familiar with the facts of the Equifax data security breach. Millions of people had their social security numbers, credit card numbers, addresses, and other personal information stolen. The aftermath has been one of anger, confusion, and a feeling of extreme anxiety – not...

General Data Protection Regulation (GDPR) | Overview, Benefits, Rules, and What it Means for Your Organization

What Is the General Data Protection Regulation (GDPR) and How Does It Affect My Organization? If your organization deals with the processing of personal data, maintaining the security and privacy of that data should be an organization’s top priority. The regulation of data security and privacy are constantly changing, and organizations must be aware of...

CIO Perspective | Top 10 Tips to Improve Your Information Security Program

Perspective from a Seasoned CIO: Top 10 Tips to Improve Your Information Security Program Author: Mike Gentile with Cameron Cosgrove As security practitioners who have built hundreds of security programs for organizations around the world, the team at CISOSHARE is able to provide a unique perspective on what it takes to design an effective information...

10 Signs You Should Invest in an Information Security Program

Why Should You Invest in an Information Security Program? Imagine the following, your business is doing well and things are spinning along at a perfect pace. You read about another information security threat making the news, but you have remained untouched by any major mishaps. You may wonder “Why to invest in a security program?”....

About NIST 800-171 And The Additional Requirements Laid Out By The DFARS

The NIST 800-171 Deadline Is Approaching. Is Your Organization Prepared? When an organization works with government agencies such as the Department of Defense (DoD), protecting sensitive information is key. A whole host of rules and regulations govern how third parties must handle such information, and failure to ensure compliance could result in loss of government...

Ransomware | What You Need to Know About Ransomware & Awareness Tips

What You Need to Know About Ransomware Over the past few months, ransomware outbreaks of “WannaCry” and “Petya” have both achieved media headlines. Both outbreaks disrupted or halted business operations of organizations across the globe. Ransomware for past few years has been a growing threat, but now it has matured into a threat that cannot...

Information Security Outsourcing | [White Paper Included]

How Can Information Security Outsourcing Benefit CISOs? It doesn’t matter if an organization specializes in healthcare, retail sales, or widget manufacturing: every organization needs a comprehensive information security program in order to secure its information from theft, loss, breaches, and other threats. Unfortunately, because of the limited number of available dedicated resources with the requisite...

Information Security Architecture | Suite of Preventive & Detective Safeguards

What is an Information Security Architecture? An information security architecture program is associated with the management and effectivity of the suite of preventive and detective safeguards as a whole within an environment. The goal of information security architecture program is to ensure that all of the security technologies implemented within the environment work together to...