Contact

The Value of Data Doctrines for Data Lake Governance

Organizations own a greater volume and variety of data today than ever before, and successful organizations use data to drive business decisions and maximize performance. Data Lakes have become an increasingly popular tool for harnessing immense amounts of available data due to their low data storage cost and their ability to adapt and grow with […]

Read More
icon / insight Created with Sketch.
Insight

Should a CISO be Better at Automation than Security?

As the story goes, and more recently popularized in the movie The Founder, Ray Kroc was speaking to a class at Harvard when asked “What business is McDonalds in?” “Restaurants!” “Hospitality!” “Supply Chain!” “Franchising!” “Entertainment!” “No!” Ray laughed and replied to each student. “Ladies and gentlemen, I’m not in the hamburger business. My business is real estate.” This […]

Read More
icon / insight Created with Sketch.
Insight

Industry Evolution of Modern Vulnerability Management

Vulnerability Management as a function has been around as long as we’ve had sophisticated IT and security organizations. Yet the overall scope and responsibilities of that function have morphed considerably over the past decade. Many organizations used to use a very narrow definition of vulnerability and simply compare configurations and software versions against a database […]

Read More
icon / insight Created with Sketch.
Insight

Preparing for the American Data Privacy & Protection Act

The average cost of a data breach in the United States is nearly 10 million dollars, the highest of any country in the world. In spite of this, the United States does not have a single comprehensive federal consumer privacy law comparable to the European Union’s General Data Protection Regulation (“GDPR”). Due to the fragmented […]

Read More
icon / insight Created with Sketch.
Insight

The Implications of AI-Assisted Code Development on Risk Management

AI-assisted code development (AICD) is a powerful tool that can be leveraged in the DevSecOps cycle to increase code efficiency. However, the increased speed and capacity for development also bring new risks to organizations. While organizations that are fast adopters of this technology will have a significant advantage over their competitors, their new development capabilities […]

Read More
icon / insight Created with Sketch.
Insight

Key Changes in PCI DSS 4.0 for Organizations to Address

Originally released in March 2022, version 4.0 of the Payment Card Industry Data Security Standard (PCI DSS 4.0) officially takes effect on March 31, 2024. The updated PCI DSS presents important changes to the world of payments, placing heavier emphasis on risk management practices, strong authentication capabilities and security awareness training. Learn more about the […]

Read More
icon / insight Created with Sketch.
Insight

Lost in Translation: Overlooking Culture Integration in M&A

Even though it’s widely known that culture alignment is important for business success, it’s often overlooked, especially within M&A scenarios. In many cases, there are clear operational and financial synergies that justify the transaction, and yet lacking culture alignment has led to countless failed integrations. Follow the link below to learn more about why cultural […]

Read More
icon / insight Created with Sketch.
Insight

Enhancing Supply Chain Efficiency Through JIT & Process Refinements

A Supply Chain is a network of organizations, people, processes, and resources involved in the production and delivery of products or services to an end consumer. This network involves a flow of goods which can involve procurement of raw materials, manufacturing, storage, distribution, delivery to customers, and recovery of goods. But, Supply Chain is more […]

Read More
icon / insight Created with Sketch.
Insight

The SEC’s Cybersecurity Incident Reporting Rule and What It Means to Your Company

Starting today, the SEC’s Cybersecurity Incident Reporting rule requires all publicly traded companies to report material cybersecurity breaches within four days. Companies must include standardized information to ensure consistent reporting of these incidents to the public. Like all SEC rules, there are financial penalties for non-compliance so company leadership should know how to respond when […]

Read More
icon / insight Created with Sketch.
Insight

How to Build Culture in a Hybrid Work Environment

As we continue to operate in a hybrid model, organizations are stuck. Virtual is not providing a space for efficient working conditions nor growing company culture, and going into the office is creating a disgruntled employee base. While both options are optimal for some, the availability of choice has created friction. Many have landed on […]

Read More