Controlling Cybersecurity Risk Surfaces, Our New CISO, T-Mobile's Breach Settlement, and More

Controlling Cybersecurity Risk Surfaces, Our New CISO, T-Mobile's Breach Settlement, and More

LogicGate Says “Hello!” to Our First CISO

No alt text provided for this image

We’re excited to announce that Nick Kathmann, Dell Technologies’ former cybersecurity director, has joined LogicGate as our first Chief Information Security Officer!

Nick brings over 20 years of cybersecurity experience to LogicGate, where he’ll help scale the company’s information security program, manage its external system security, drive platform security innovations and engage with LogicGate customers on security management.

Click here to learn more about Nick


Busting the “Compliance Equals Security” Myth

No alt text provided for this image

Regulations are intended to prevent certain adverse security situations from happening. But merely being in compliance with regulatory requirements doesn’t necessarily mean your organization is secure.

It’s a paradox, for sure, but one that LogicGate’s Chris “Cpat” Patteson and Horizon Media’s Praj Prayag untangled during a recent OCEG webinar. Click below to watch their discussion on demand.

Watch Now


Your Cyber Risk Priorities for 2023

No alt text provided for this image

Prioritizing your cyber risk correctly makes staying on top of the most significant cyber threats easier, even when resources are tight.?

Check out our recent webinar, “Straight from a CISO: 4 Cyber Risk Priorities in 2023,” to hear two GRC experts lay out their vision for which cyber risks should take center stage in the new year.

You’ll learn how to:

  • Do more with less across risk management teams
  • Identify and prioritize risks with the largest impact
  • Start translating cyber risk impact into financial terms
  • Brace your team for inevitable change in 2023

Watch Now


T-Mobile’s Breach Settlement: A Wake Up Call For Us All

No alt text provided for this image

A 2019 data breach has T-Mobile facing down the second-most costly settlement for a cyberattack in US history, ringing in at a whopping $350 million.

It’s yet another case study in why investing in cyber risk management programs should be a priority for every organization, LogicGate’s Field Risk Officer, Chris “Cpat” Patteson recently told InformationWeek.

Read Now


3 Steps for Communicating Cyber Risk

No alt text provided for this image

There are plenty of ways you can go about communicating the consequences of failing to take cyber risk management seriously, but there’s one that reigns supreme: Illustrating the damage it could do to your bottom line.

That’s because nothing commands the attention of leadership quite like flashing dollar signs—especially red ones, with little minus signs in front of them. Here’s our guide to building support for your cyber risk programs by telling stories rooted in financial impact.

Read Now


Take Control of Your Cybersecurity Risk Surface

No alt text provided for this image

Cybersecurity risk surfaces are in a constant state of flux. Managing them to ward off threat actors and keep your organization’s data and assets secure is a daunting task.

Fortunately, there are plenty of ways to make it a much more manageable endeavor, and it all starts with the right GRC software. Here’s how to do it.

Read Now


The 5 Layers of a Mature GRC Program

Building a mature, sophisticated GRC program is a bit like baking a layer cake. It takes a little extra time and work to prepare each progressive layer, but when it’s complete, it’s pretty darn impressive.

Cooley’s Director of Security and Information Governance, Mike Santos, has assembled quite the risk management layer cake at the global law firm. He recently joined the GRC & Me podcast to share his model.?

Check out our conversation with Mike below.

要查看或添加评论,请登录

LogicGate的更多文章

社区洞察

其他会员也浏览了