By Mitch Parker
Academic Healthcare CISO

In this three-part series, Academic Health care CISO Mitch Parker shares his insights on ransomware, incident response and best practices for building a world class prevention program.

Ransomware has been the buzzword du jour for the past year in computer security.  This mostly unsophisticated attack type uses deception and already-existing means of communication to destroy the integrity of systems and shut down businesses by holding their critical assets for cryptocurrency ransom via encryption. 

Source: securitycurrent

By Grace Crickette 
San Francisco State University Interim AVP of Business Operations

In this series, Grace Crickette provides C-Level executives a comprehensive overview of cyber insurance, while addressing business impacts and offering best practices for implementing a risk-management strategy that includes a cyber-liability policy.

Part One

Part Two

Part Three: Risk Management and Insurance Basics

Insurance and Risk Management Basics

Insurance is just one tool in the Risk Managers belt, but sometimes it is their favorite tool. Why? 

Source: securitycurrent

Security professionals have been taught the Security Triad – Confidentiality, Integrity and Availability – but there’s another triad just as critical to data protection

Category:

Information Security

Security professionals know of the Security Triad – Confidentiality, Integrity and Availability – but there’s another triad just as critical to data protection. In this article, we begin with visibility.
Source: SecureWorks