The New European Union (EU) Data Protection Regulations & Procedures [VIDEO]

The objective of this document is to give a high-level overview of the new rules and regulations surrounding the newly passed European Union (EU) General Data Protection Regulation (GDPR). This new regulation is replacing the 20-year-old directive (95/46/EC). All Companies Must be in Compliance with EU’s General Data Protection Regulation  Keep in mind, by May 25,...

Implementing a HIPAA Compliant Security Program

Over the past couple years there has been a dramatic increase in security related attacks on all businesses’. At the core of these attacks is a desire by the attackers to acquire valuable data that can be used for illicit monetary gain. Few industries manage as valuable a data as the health care discipline. As...

Top 5 Best Security Program Development Best Practices

Building a new security program from scratch or trying to update and change existing policies can seem overwhelming. Between making sure your program is compliant with regulatory requirements and getting approval from any governing board, there’s a lot to juggle. Read about our top 5 best practices to make the process of developing a security...

Be Involved with Customer Security Audits — Answers Matter

Many companies that send out information security assessments have thousands of third parties that they’re sending them to. Because of this, they generally employ a red-flag model to have assessments of interest bubble to the top of the pack. This isn’t necessarily a valid model to assess the security of another company, but it’s still...

Veterans in Security: Related Cyber Security Terminology

Cyber Security is a relatively new field. Fortunately, for veterans, many of the concepts and much of the terminology is directly related to the military. Security, investigations, perimeter protection, encryption, intelligence, and threat analysis are all concepts and terms a veteran is trained to understand from their time and experience in the military. Standard Operating...

What Is Security?

Defining Security Is Essential In Any Organization Security is defined in many ways within an organization, from locks on the doors, to computer passwords and anti-virus software. Your definition of security is going to be different than mine. It’s also going to be different than the definitions from all of the stakeholders and employees in...

What Can We Learn From Russian Hacking?

Lessons in Security Development from Russian Hacking There are lots of conversations about whether we should do more investigations based on the constant attacks. When looking at this from the perspective of what matters to the common organization, we need to understand two things: 1. If an attack occurs on your organization, do you have...

Benefits for Veterans in Cyber Security and Transferrable Skills

Many veterans leaving the service try to find a way to make their military experience transferable to the civilian sector – something that isn’t always easy. However, one terrific industry to line your skills up with is cyber security. Cyber Security takes its shape from security operations and most security operations in the world stem...

What are Some Benefits for Veterans in Cyber Security?

After two combat deployments to Iraq with the Marines, I knew I wanted to leave the military when my contract was done. Like so many other veterans transitioning out of the service, I wasn’t exactly sure where I belonged in the civilian sector. I had a plan, finish my education, get my career going and...

How Organizations Will Act in 2017 on Their Security Programs

Option 1: Organizations will take the “diet pill” strategy In the year 2017, organizations will be seen taking many shortcuts in the pursuit to do something with their security systems. What most people don’t know is that the security program development process takes a time and is essentially process-based. The main purpose of a security program...