article thumbnail

In Cybersecurity, the Agility and Speed of Small Banks is an Advantage

FS-ISAC

As a financial services cybersecurity professional who has worked on three continents for large multinational institutions, I understand the advantages and challenges for security departments at banks both large and small. This is a problem in a cybersecurity landscape defined by rapid change. Effectively Presenting Cyber Risk.

Banking 59
article thumbnail

What is COBIT? COBIT Explained

BMC

Its latest iteration, COBIT 2019 , has revamped parts of its framework while offering much-needed updates that accounts for ever-present cybersecurity threats and the incorporation of Agile and DevOps practices. ISACA focuses on IT governance, risk management, cybersecurity, and auditing support with standards, guidelines, and best practices.

Audit 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

SIA New Member Profile: Enterprise Security, Inc.

Security Industry Association

Joseph Emens : Established in 2000, Enterprise Security, Inc., Our services include service and support, professional services, national services, monitoring, cybersecurity, door and fire services. Cybersecurity as a service : As cyber threats evolve, more businesses will turn to cybersecurity as a service provider.

article thumbnail

Cyber Ransoms – Should I Pay?

Plan B Consulting

Cybersecurity is improving which makes the attacks more difficult but I think only once government’s strongly legislate against the paying of ransoms, perhaps even with personal liability on those who paid the ransom, provided the money or authorised it, will these attacks then greatly reduce.

article thumbnail

Cyber Ransoms – Should I Pay?

Plan B Consulting

Cybersecurity is improving which makes the attacks more difficult but I think only once government’s strongly legislate against the paying of ransoms, perhaps even with personal liability on those who paid the ransom, provided the money or authorised it, will these attacks then greatly reduce.

article thumbnail

What Is AMI Data and How Can Utility Companies Benefit from It?

Pure Storage

The first AMI meters, installed between 2000 and 2010, were a game-changer. Cybersecurity Technologies Given the sensitive nature of energy usage data, utilities need to implement strong encryption methods and security protocols to protect data both at rest and in transit.

Outage 52
article thumbnail

What is COBIT? COBIT Explained

BMC

Its latest iteration, COBIT 2019 , has revamped parts of its framework while offering much-needed updates that accounts for ever-present cybersecurity threats and the incorporation of Agile and DevOps practices. ISACA focuses on IT governance, risk management, cybersecurity, and auditing support with standards, guidelines, and best practices.

Audit 52