Author: Dr. Jack Dever J.D., LL.M., S.J.D.
← Back to Blog
Search
Authors
EDRM Trusted Partner Lockhaven Solutions Announces Addition of Gretchen Ruck
WASHINGTON, D.C., USA, June 22, 2023/EINPresswire.com/ — Lockhaven Solutions, a premier Service-Disabled Veteran-Owned cybersecurity firm is proud to announce the addition of Gretchen Ruck. As a trusted advisor to established boards, senior executives and investors,...
Cyber Fundamentals: A Tale of Two Companies
Cyber Risk Management Chronicles, Episode IX A picture is worth 1,000 words (especially if it has a lot of words on it). We live in the age of eternal breach – cyber and data privacy...
Cyber Fundamentals: You Can’t Spell “Cybersecurity” Without “IG”
Cyber Risk Management Chronicles, Episode VIII All too often, organizations forget that cybersecurity is not a technology, it is a strategy. Throughout the industry we see reliance placed on technical solutions without much thought given...
Cyber Fundamentals: Ready or Not, Here it Comes!
Cyber Risk Management Chronicles, Episode VII From a regulatory perspective, many industries have been living in the land of milk and honey as cyber programs have largely been guided by voluntary measures. However, regulator’s patience...
Cyber Fundamentals: The New Cybersecurity Triad
Cyber Risk Management Chronicles, Episode VI Let’s talk about the “New Cybersecurity Triad.” We’re all pretty familiar with the venerable C-I-A Triad whereby secure data exhibits the characteristics of Confidentiality, Integrity, and Availability. But today’s...
Cyber Fundamentals: Tabletop Exercises
Cyber Risk Management Chronicles, Episode V Cybersecurity programs must be tested on a routine basis. It takes significant time and effort to develop a cybersecurity program. The efficacy of a program is only theoretical until thorough...
Cyber Fundamentals: Benefits of the NIST CSF
Cyber Risk Management Chronicles, Episode IV The CyberSecurity Framework (CSF) was created to solve a pernicious problem – repeated, damaging cyberattacks against US critical infrastructure sectors. The danger was such that President Barack Obama directed...
Cyber Fundamentals: Risk Based CyberSecurity
Cyber Risk Management Chronicles, Episode III The reality of finite resources means cybersecurity programs that attempt to ‘boil the ocean’ – protect everything at once – are destined to fail. Risk-based cybersecurity programs are the solution. With...
Cyber Fundamentals: Cybersecurity as Part of Risk Management
Cyber Risk Management Chronicles, Episode II Risk management is the process of minimizing or mitigating risk. It begins with identification and evaluation of the various types of risk that an organization faces, determining the probability...
Cyber Fundamentals: Role of Top Management
Cyber Risk Management Chronicles: Episode 1 All organizations are at different stages of cybersecurity risk management program development. These stages range from one end of the spectrum, where cybersecurity is not a consideration at all,...