Controlling Cybersecurity Risk Surfaces, Our New CISO, T-Mobile's Breach Settlement, and More
LogicGate Says “Hello!” to Our First CISO
We’re excited to announce that Nick Kathmann, Dell Technologies’ former cybersecurity director, has joined LogicGate as our first Chief Information Security Officer!
Nick brings over 20 years of cybersecurity experience to LogicGate, where he’ll help scale the company’s information security program, manage its external system security, drive platform security innovations and engage with LogicGate customers on security management.
Busting the “Compliance Equals Security” Myth
Regulations are intended to prevent certain adverse security situations from happening. But merely being in compliance with regulatory requirements doesn’t necessarily mean your organization is secure.
It’s a paradox, for sure, but one that LogicGate’s Chris “Cpat” Patteson and Horizon Media’s Praj Prayag untangled during a recent OCEG webinar. Click below to watch their discussion on demand.
Your Cyber Risk Priorities for 2023
Prioritizing your cyber risk correctly makes staying on top of the most significant cyber threats easier, even when resources are tight.?
Check out our recent webinar, “Straight from a CISO: 4 Cyber Risk Priorities in 2023,” to hear two GRC experts lay out their vision for which cyber risks should take center stage in the new year.
You’ll learn how to:
T-Mobile’s Breach Settlement: A Wake Up Call For Us All
领英推荐
A 2019 data breach has T-Mobile facing down the second-most costly settlement for a cyberattack in US history, ringing in at a whopping $350 million.
It’s yet another case study in why investing in cyber risk management programs should be a priority for every organization, LogicGate’s Field Risk Officer, Chris “Cpat” Patteson recently told InformationWeek.
3 Steps for Communicating Cyber Risk
There are plenty of ways you can go about communicating the consequences of failing to take cyber risk management seriously, but there’s one that reigns supreme: Illustrating the damage it could do to your bottom line.
That’s because nothing commands the attention of leadership quite like flashing dollar signs—especially red ones, with little minus signs in front of them. Here’s our guide to building support for your cyber risk programs by telling stories rooted in financial impact.
Take Control of Your Cybersecurity Risk Surface
Cybersecurity risk surfaces are in a constant state of flux. Managing them to ward off threat actors and keep your organization’s data and assets secure is a daunting task.
Fortunately, there are plenty of ways to make it a much more manageable endeavor, and it all starts with the right GRC software. Here’s how to do it.
The 5 Layers of a Mature GRC Program
Building a mature, sophisticated GRC program is a bit like baking a layer cake. It takes a little extra time and work to prepare each progressive layer, but when it’s complete, it’s pretty darn impressive.
Cooley’s Director of Security and Information Governance, Mike Santos, has assembled quite the risk management layer cake at the global law firm. He recently joined the GRC & Me podcast to share his model.?
Check out our conversation with Mike below.