David Anderson's career began in banking and followed a path to the rapidly changing world of cyber insurance. Anderson, vice president of cyber liability at Woodruff Sawyer, shares how he built a practice rooted in transparency, trust and client education.
For governance, risk, and compliance (GRC) projects to succeed, they must focus on delivering real business value, says John Hermans, Head of Europe Cybersecurity at Wipro. Compliance isn’t just for auditors—it’s about safeguarding customer data, ensuring operational continuity, and enhancing cyber...
According to John Hermans, Head of Europe Cybersecurity at Wipro, automation is essential for successful governance, risk, and compliance (GRC) programs. Automated processes reduce errors, deliver rapid results, and improve user experience by eliminating manual labor. However, many organisations struggle to find the...
The European Union’s updated Network and Information Systems Directive (NIS2) comes into effect in October 2024. Ensuring best practice governance and reducing exposure to cyberattacks are top business priorities right now, so following this legislation is non-negotiable for those who want to protect...
One in three organizations can’t proactively manage risk with their current GRC program.
In partnership with Osterman Research, we're excited to share results from our new 2024 GRC Strategies, Teams, and Outcomes Report that surveyed 350 risk, cybersecurity, and compliance leaders from around the world and...
Hornetsecurity purchased French email security vendor Vade to expand its geographic footprint and protection capabilities around Microsoft 365 for small and midsized businesses. The acquisition of Vade will allow the joint company to have a strong presence in Europe's two most important markets.
Today’s enterprises need modern governance, risk management, and
compliance (GRC) software that is adaptive, integrated, and intuitive enough to
meet these challenges head-on. For GRC 20/20’s Michael Rasmussen,
LogicGate Risk Cloud is a top contender among those solutions.
Explore Rasmussen’s report,...
Exterro has purchased a data discovery vendor led by a GE and Symantec veteran to help organizations detect, measure and remediate risk around structured data. The deal will allow Exterro customers to analyze structured data without ingesting tons of information or putting a load on company systems.
Recently acquired RiskLens edged out startup Axio and incumbent ThreatConnect for the top spot in Forrester's first-ever cyber risk quantification rankings. Cyber risk quantification focused on theoretical methodology for about 10 years but shifted to practical applications over the past five years.
OneTrust hauled in $150 million a year after laying off 950 employees but had to slash its valuation by $800 million to seal the deal. The Atlanta-based company intends to use the proceeds to accelerate its growth and fulfill customer demand for trust intelligence software.
Spoiler alert: In 2022, audits found open source in 100% of our customer engagements.
Since open source usages are now so pervasive, companies are increasingly concerned about the security of applications built on the foundation of open source components. Consequently, open source security and license compliance...
The nature of the new "norm" in this post-pandemic era of remote work is revolutionizing how your organization has to operate. With dozens of applications used across a diverse landscape, how do you ensure that your organization stays secure while being compliant with changing rules and regulations?
Cyber risk quantification (CRQ) is the measure of an organization’s cyber risk expressed in monetary terms, like dollars. CRQ has many benefits, but few security professionals understand how to implement it.
Join Paul Kelly, former head of risk at HSBC, and Chris Griffith, chief product officer at Balbix, as they...
RegScale has purchased a startup founded by the FCC's former chief data officer that makes documenting compliance easier for nontechnical personnel by using a questionnaire. The GovReady deal means customers will be able to demonstrate their adherence to standards by answering questions.
Ninety-four percent of recent survey respondents are concerned that TLS 1.3 will break their existing security controls. With the ever-expanding amount of encrypted network traffic mandated, it’s important to understand how to balance user and customer privacy with security controls. Join experts from Cisco Security...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.