article thumbnail

How Secure is our Election System?

Disaster Zone Podcast

In this podcast we look at one individual county and the security measures used from a physical and cybersecurity perspective, but then also preventing voter fraud from occurring. The podcast guest is Mary Hall, Auditor, Thurston County, Washington. The podcast guest is Mary Hall, Auditor, Thurston County, Washington.

Security 130
article thumbnail

Cybersecurity Awareness Month: The Perfect Time to Implement and Mature Your Cyber Response Strategy

Castellan

October is Cybersecurity Awareness Month , and it’s a great time to take a closer look at the cyber resilience components of your business continuity and resilience plans to ensure your organization is on the right path to not just prevent potential cyber events, but to be prepared to respond to the new inevitable—when an incident happens.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

IRM, ERM, and GRC: Is There a Difference?

Reciprocity

As a result, in 2004, the Committee of Sponsoring Organizations (COSO) issued a second framework: Enterprise Risk Management -Integrated Framework , subsequently updated in 2017. COSO’s ERM framework builds upon, and is intended to work with, the committee’s internal control framework issued in 1992 and updated in 2013.

article thumbnail

Security Industry Association Names Scott Gross as 2024 SIA Insightful Practitioner Award Honoree

Security Industry Association

Since joining Con Edison in 2004, Gross has played an invaluable role in mitigating the growing menace of drone activity over critical infrastructure, integrating airspace security solutions to monitor and respond to drone incursions and ensuring comprehensive surveillance and real-time threat assessment.

Security 112
article thumbnail

SIA New Member Profile: FDI

Security Industry Association

Due to our national success and driven by the international connections from the group, we decided in 2004 to export our products and services. Cybersecurity : Last but not least, some legacy systems have cybersecurity vulnerabilities that often are not revealed. What does SIA offer that is most important to you/your company?