Remove Asset Management Remove Evaluation Remove Financial Services
article thumbnail

Peer-Benchmarked Threat Resilience Metrics

FS-ISAC

Introducing the “FS Index” The Financial Services Threat Simulation Index (the “FS Index”) is a free, shared test plan for measuring threat resiliency and trending over time. The current test plan is 60 test cases mapped to 7 nation state threat actor groups most commonly targeting the financial services industry.

article thumbnail

Peer-Benchmarked Threat Resiliency Metrics

FS-ISAC

Introducing the “FS Index” The Financial Services Threat Simulation Index (the “FS Index”) is a free, shared test plan for measuring threat resiliency and trending over time. The current test plan is 60 test cases mapped to 7 nation state threat actor groups most commonly targeting the financial services industry.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Colonial Pipeline Hack: Failure in Risk Management

LogisManager

For example, a forensic finding made during an evaluation of Colonial Pipeline noted numerous known and preventable vulnerabilities, such as unpatched and outdated systems, that likely led to the security breach. Asset Management. Steven Minsky is a recognized thought leader in risk management , CEO and Founder of LogicManager.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

CA – Security Assessment and Authorization: Evaluating the effectiveness of security controls and authorizing system operations. PT – PII Processing and Transparency: Managing personal information with transparency and accountability. Protect: Assure that critical infrastructure services remain available. Manage remote access.

article thumbnail

Guide: Complete Guide to the NIST Cybersecurity Framework

Reciprocity

CA – Security Assessment and Authorization: Evaluating the effectiveness of security controls and authorizing system operations. PT – PII Processing and Transparency: Managing personal information with transparency and accountability. Protect: Assure that critical infrastructure services remain available. Manage remote access.