Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Management

Welcoming Bob Lyle,Our Chief Revenue Officer

‍We are thrilled to welcome Bob Lyle to Riscosity as our Chief Revenue Officer. Bob is an accomplished executive with extensive GTM experience in scaling software and security companies. He will be responsible for the planning, development, and global execution of our revenue strategy as we continue to evolve our business.

Webinar: Is the biggest risk the one you can't see coming? With EY & Tanium

An exclusive webinar in collaboration with EY to learn how the Managed Visibility and Control joint solution addresses DORA and NIS2 regulatory compliance challenges. Organizations need to be smart about their data, network and endpoint device security while managing the associated risks as access to data becomes more fluid. Where most security breaches once came through networks, now it’s the endpoint devices becoming targets for bad actors.

The SEC, the SolarWinds Complaint, and the Lack of Transparency

‍ The US Securities and Exchange Commission's complaint against SolarWinds and its Chief Information Security Officer (CISO) Tim Brown has sent shockwaves through the cybersecurity community. Solarwinds and Brown have been accused of fraud, the details of which can be found in an extensive 68-page document. ‍ This complaint, in itself a bold move, has been particularly jolting to cyber professionals given the SEC’s July 2023 regulations.

90% of Energy Companies Experienced a Third-Party Breach

More than two years after the major U.S. pipeline ransomware incident, the SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team has released a new report revealing that 90% of the largest global energy companies have experienced a third-party breach in the past 12 months. This research highlights the uphill battle faced by the energy industry in combating emerging threats across the supply chain.

Third-Party Data Breach Response Playbook

The risk of data breaches has become an omnipresent concern for businesses and organizations. And as technology continues to evolve, so do the tactics of cybercriminals. One critical aspect of cybersecurity strategy involves preparing for and responding to third-party data breaches. A well-constructed response playbook is indispensable in mitigating the potential damages and ensuring a swift recovery.

Introducing Bitsight Portfolio Risk Analytics

Do you know what percentage of your vendors are at higher risk of ransomware attack? Can you drill-in to see exactly who? Or more importantly, why? Or how effective your vendor program has been in reducing risk to the business over the last 12 months? In the ever-connected world of partners and suppliers, vendors and even more vendors, the line between ‘their risk’ and ‘your risk’ disappeared. And what security and compliance teams need more of is not more data, but insights.

Iran-Linked Attack on U.S. Water Treatment Station

On November 25, the U.S. municipal water authority in Aliquippa, Pennsylvania confirmed that one of its booster stations had suffered an attack by a threat actor group that supports Iranian geopolitical interests. The attack by a cyber group known as CyberAv3ngers compromised a programmable logic controller (PLC) for a water pressure monitoring and regulation system. Officials, however, have made it clear that the incident did not threaten local drinking water or water supplies.

What Is an Audit Trail and What Purpose Does it Serve?

Audits are independent assessments of the security of sensitive data and computer systems or a company’s financial reporting. Audits can be time-consuming and often feel peripheral to most people’s daily workload – but they are crucial exercises. Hence, it’s essential to establish an audit management process.

Important Disaster Recovery Scenarios to Test

However safe and resilient your company’s operations might be, there’s always the chance that something will occur to interrupt business operations. Hence every company should have a disaster recovery plan that maps out how to respond to a disaster, so that the company can return to normal operations as soon as possible. That said, companies need to do more than write a plan.

Maximizing Third-Party Risk Management: A Step-by-Step Guide

In today’s interconnected business environment, third-party partnerships are essential for growth and operational efficiency. However, these collaborations bring inherent risks, especially in the realm of cybersecurity. Effective third-party risk management is crucial for safeguarding sensitive data and maintaining business continuity.