Most cybersecurity programs prepare students for theory. https://player.vimeo.com/video/1124881394 At Augusta University (AU) Cyber Defense, students enter a fully operational cybersecurity program, known as SIEGE CyberOps, where they train for what many professionals...
Don’t use the word Compliance…
Don’t use the word Compliance…
Benefits of a Cybersecurity Feedback Loop
Organizations that realize cybersecurity is fluid and implement feedback loops are positively better equipped to address emerging risks…
Updating Risk Analysis Beyond a Point of Time Exercise
I’ve seen the most resilient organizations follow and address risks as they ebb and flow; it does not follow a schedule…
Recovery Success: When It’s Clear What is at Stake
I wish every client understood that effective recovery doesn’t start with a plan — it starts with knowing exactly what’s at stake…
For compliance: Don’t Start with Technology, Start with Governance
Hospitals don’t fail compliance because they lack technology; they often fail often because they lack this one important element…
Experts: Shutdown Strains Healthcare Cyber Defenses
Reduced Staffing Disrupts Regulatory Work, Leaves Health Entities More Vulnerable
The Perennial Cybersecurity Problem: Tool Proliferation and the Talent Crisis
By: Larry Mraz, CISSP, CRISC, CHPP, CISM, CISA, BCMS vCISO/Principal Consultant Cybersecurity is at a breaking point. Organizations are burdened by two interconnected crises: the unchecked proliferation of security tools and the persistent shortage of skilled...
Secure and Compliant: OCR-Quality Risk Management in Action
In this on-demand webinar, join Clearwater Board Advisor, Steve Cagle, and VP of Security Services, Dave Bailey, in a thought-provoking discussion with Lori Dutcher, Chief Compliance Officer at Beth Israel Lahey Health. Together, they will explore how healthcare...
Integrating Cybersecurity into Daily Operations
Your strongest defense isn’t another tool, and it is already within your organization…