Posts
-
Apr 13th, 2021
Inside The Lean Six Sigma of Cybersecurity
Some of the greatest companies in the world have embraced the Lean Six Sigma process improvement methodology to eliminate errors, remove waste and inefficiency, and improve operational performance. At
-
Apr 7th, 2021
RQ Enables the Cyber Risk Conversations You’ve Been Waiting For
Modern businesses undergo changes every day that introduce cyber risk and obfuscate residual risks. This is especially true as companies digitize their operations and continue to have a healthy appeti
-
Mar 15th, 2021
5 Cybersecurity Challenges Chief Information Security Officers Must Tackle in 2021
Chief Information Security Officers (CISOs) operate in a world full of systemic risk, fueled by forces beyond their individual control. Unfortunately, despite a myriad of technological advances and th
-
Feb 4th, 2021
Communicating Risk, Threat, Response to the C-Suite & Board
The Wannacry ransomware attack made 2017 one of the worst years for cybersecurity in recent memory, incapacitating hundreds of thousands of computers in 150 countries and causing billions of dollars i
-
Jan 20th, 2021
Beyond Information Sharing: DHS Begins Cyber Risk Quantification Push
The Cybersecurity and Infrastructure Security Agency (CISA) has launched a new cybersecurity effort to develop actionable metrics and quantify cyber risk across the nation’s critical infrastructure
-
Jan 14th, 2021
Cyber Risk Quantification: The Pressure Is On (New Survey)
New survey suggests companies aren’t prepared or equipped to deliver cyber risk quantification data Cyber risk has long been acknowledged as one of the top risks facing companies of all sizes. And w
-
Jan 13th, 2021
Welcome to the Age of Automated Cyber Risk Quantification
This year the conversation about cyber risk and cyber risk quantification must change. Even the best vulnerability management program isn’t really addressing cyber risk. Did you know that more than
-
Sep 10th, 2020
ThreatConnect: The Brain of Security
Why Acquiring Nehemiah Security was the Right Decision Since its inception, ThreatConnect has used the analogy that it wants to be the “brain of security,” to act as its central nervous system pro