Dear India, Let’s get to action on Cyber Security

Wanted to dedicate this piece of work to our country India FixNix Year III Anniversary Celebrations- Part 1 Nov’22 2012 to Nov’22’2015 Member,Cyber Security Task Force of India. Got invited for few activities of National Cyber Security Awareness Month here in US Last month, October https://www.staysafeonline.org/ncsam/champions/all-champions/ My frustration level went up when i found billion$ security companies to training institutions to water supply company to defense agencies to 100 other…

Adding Cyber Security to Corporate Risk Management

Corporate boards and senior management like to focus on business. They love the numbers, the strategy and the success of a business operation. They have a passion for it and that is why they are sitting on board or managing a global company. They do not like to talk as much about risks, much less plan for them. When it comes to information governance and protecting the company from hackers…

BAE Systems completes SilverSky acquisition

Further to the announcement of 21 October 2014, BAE Systems has completed the acquisition of Perimeter Internetworking Corp., which trades as SilverSky, a commercial cyber service provider. The consideration of $232.5 million (approximately £144.4 million) has been funded from BAE Systems’ existing cash resources. SilverSky is a commercial cyber services and compliance provider, headquartered in New York, with operations in the US and the Philippines. The company currently employs approximately…

Firms struggling to keep pace with increasing IT security risks

According to a new global survey, many firms are struggling to keep pace with global IT risks amid quickly changing technology. The fourth annual IT Audit Benchmarking Survey was produced by global consulting firm Protiviti and global IT association ISACA. The survey examines how organizations are assessing and mitigating critical business and technology risks, polling more than 1,300 IT audit executives and professionals worldwide. “Concerns over cybersecurity, industry disruptors and…

RHSB’s Jones Receives Cyber Risk Management Leadership Award

Douglas R. Jones, senior vice president and principal at Texas-based Roach Howard Smith & Barton, was presented with the Cyber Risk Management Leadership Award 2014-15 at the annual Cyber Risk Management Boot Camp held in Atlanta, Ga., and hosted by INSUREtrust. The Cyber Risk Management Leadership Award is given to select independent agents that demonstrate expertise in cyber risk management, have addressed their own firm’s cyber risks, and have shown proficiency…

Resolve security control issues on a PaaS with this risk management framework

Identifying, implementing, and assessing security controls for an information system can be a burden. Ease your mind by following this six-step risk management framework. Risk management provides a framework to help you select security controls to protect an information system anywhere in the development life cycle on a Platform as a Service (PaaS) — it doesn’t matter whether it’s an engineering, procurement, or personnel system. The security controls are implemented…

Protiviti and ISACA Study Reveals Disparity Between Growth of IT in Business and Auditing of IT Risks

Although organizations have made strides in establishing best practices for the IT audit function, many are struggling to keep pace with global IT risks amid rapidly changing technology environments, according to a joint survey from global consulting firm Protiviti (www.protiviti.com) and global IT association ISACA (www.isaca.org). The fourth annual IT Audit Benchmarking Survey examines how organizations are assessing and mitigating critical business and technology risks. The global survey reflects the…

SurfWatch Labs Acquires Cyber Risk Management Technology to Complement its Portfolio of Risk Intelligence Solutions

SurfWatch Labs, a provider of cyber risk intelligence solutions, today announced it has acquired a proprietary, SaaS-based risk management technology that delivers prescriptive steps for proactively managing impending cyber risks. This risk management application provides executives and security professionals with a practical approach to quickly implement the most effective measures from a security policy, process, technology and compliance perspective – tailored specifically to an organization’s business profile. As part of…

Security Readers’ Choice Awards 2014: Identity and access management

Readers vote on the best identity and access management systems of 2014. The identity and access management (IAM) market has been shaped by two emerging trends over the last year: ease of use for customers, and extensibility into cloud and mobile use cases. IAM products have also become more focused on establishing behavioral baselines and providing anomaly-based alerts, says Andras Cser, vice president and principal analyst at Forrester Research Inc.,…