Information Risk Management: Who is responsible for selecting the security controls for an information system?

Sure, you use a password management system that adds salt – random data – to hashed passwords and consider using slow hash functions,  that however doesn’t take away that entities noted deficiencies in controls over information asset and risk management, information security program management, information security incident management, and technology Read more…

Cybersecurity: How has or does your organization plan to deploy machine learning for cybersecurity purposes?

Cybersecurity is a component of information security, cybersecurity deals with the protection of digital assets and cybersecurity should align with enterprise information security objectives. One of the best cybersecurity solutions to implement to reduce the risk of web-based attacks is a web filter. There should be a process to formally Read more…

Cyber Threat Hunting: Are all your Data Privacy policies updated on a regular basis and how do you check that some are effective?

You need to facilitate effective team dynamics, so that when a cyber-crime event occurs, the information security (IS) team or information technology (IT) team immediately begins attacking the problem with all of its resources abd defending against cyber criminals accessing your sensitive data and trusted accounts. Today, all companies- regardless Read more…

Information security: When conducting a business process reengineering study, what should we look for when trying to identify business processes to change?

Save time, empower your teams and effectively upgrade your processes with access to this practical Information security Toolkit and guide. Address common challenges with best-practice templates, step-by-step work plans and maturity diagnostics for any Information security related project. Download the Toolkit and in Three Steps you will be guided from Read more…