A Ceasefire in the War Between IT and Security Operations

A Ceasefire in the War Between IT and Security Operations

Friction has existed between IT departments and Security Operations for years. If turf wars and business silos are not the cause, the lack of collaboration and communication will often lead to disharmony between the two. The left hand should know what the right hand...
IRM: A Cybersecurity Vision for the Entire Organization

IRM: A Cybersecurity Vision for the Entire Organization

ISE® FIRESIDE WEBINAR: Integrated Risk Management: A Cybersecurity Vision for the Entire Organization Sponsored by: Lynx Technology Partners Companies need to integrate cybersecurity throughout the corporate structure, strategy and culture, so that all employees (even...
Cybersecurity in the New Normal

Cybersecurity in the New Normal

An engaging dialogue from the cybersecurity industry. An empathetic, but real discussion about cybersecurity and how it’s evolving in the age of COVID-19. Covering it in a way that is relatable to all while touching on the people, process, and technology aspect of...
The Phishing Breakthrough Point

The Phishing Breakthrough Point

Utilizing security awareness training and phishing security tests can be a useful and effective tool to reduce unintentional insider threats. However, if robust metrics are not put in place to effectively gauge the click rate patterns from a human landscape...