Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Razorthorn

The Expanding Web of Organizational Supply Chains and Security Risks || Razorthorn Security

In this video, we delve into the intricate web of organizational supply chains and the heightened complexities they bring to the realm of cybersecurity. With the interconnected nature of modern businesses, from retailers to manufacturers to insurers, the reliance on numerous other entities introduces a myriad of potential vulnerabilities. Join us as we explore the evolving landscape of malicious activities and data breaches, highlighting the exponential growth in complexity over the past two decades.

Cyber Trends in Identity and Access Management with Simon Moffatt || Razorthorn Security

Hello Razorwire listeners! It's your host Jim here, and in today's fascinating episode, we sit down with cybersecurity veteran Simon Moffatt. With two decades under his belt in the dynamic field of identity and access management, Simon unpacks the complexities of cyber protection in our modern age. From the evolution of technology to the murky waters of liability and insurance in cybersecurity, Simon's insights shed light on the challenges and trends we face.

Unlocking Security: MFA vs. Passwords | Navigating Compliance Challenges || Razorthorn Security

Ditching passwords for a more secure future with Multi-Factor Authentication (MFA)! Explore the realm of technical feasibility and compliance requirements. Discover why it's crucial to go beyond the words and address the true intent of security measures. Join the conversation as we delve into the legal intricacies hashed out in court. Don't miss this insightful discussion on revolutionizing your approach to online security!

Decoding Cybersecurity: Pipelines vs. Power Grid | Unveiling the Unique Challenges in Legislation

Dive into the fascinating realm of cybersecurity with our latest exploration, as we dissect the historical focus on electricity grids versus the unique challenges posed by pipelines. Traditionally, issues on the electricity grid have captured immediate attention, often portrayed in Hollywood hacking scenes with dramatic attempts to switch off lights. However, the landscape shifts when it comes to pipelines.

Striking the Right Balance: Compliance vs. Real Cyber Risks | Navigating Organizational Priorities

In our latest exploration of cybersecurity challenges, we delve into the delicate balance organizations must strike between compliance efforts and the real cyber risks they face from the outside world. It's a common pitfall for organizations to develop a higher tolerance for compliance risks, often channeling significant resources and funds into demonstrating adherence rather than actively managing and mitigating specific threats.

Redefining Compliance: Navigating the Shift to Risk-Based Controls | EU NIS Directive Insights

Embark on a journey through the evolving landscape of cybersecurity compliance as we uncover the challenges inherent in traditional frameworks. The stark reality is that compliance doesn't automatically equate to effectively managing organizations' risks and specific threats.

Navigating Cybersecurity Compliance: The Need for GRC Tools and Strategic Oversight #podcast

Delve into the complex world of cybersecurity compliance with our latest video, where we address the crucial question: How do you effectively track and manage diverse compliance requirements across the board? In an era where adhering to one set of regulations might not align with another, the need for a comprehensive GRC (Governance, Risk, and Compliance) tool becomes paramount.

Cybersecurity Dilemma: Balancing Government Involvement Without Sacrificing Security Budgets

Unravel the cybersecurity dilemma in our latest video, where we explore the complex relationship between government involvement and corporate cybersecurity programs. Many cybersecurity leaders may express reluctance when asked about government intervention, fearing the additional burdens of setting up new compliance wings and diverting resources from tangible security budgets.

Legislative Challenges: Navigating Knee-Jerk Reactions in Cybersecurity || Razorthorn Security

Explore the pitfalls of knee-jerk legislative reactions in the ever-evolving landscape of cybersecurity in our latest video. Delve into the challenges faced by organizations as they grapple with sudden directives that often emerge as a response to unforeseen events. The knee-jerk nature of some legislation raises crucial questions about the consultation process, leaving cybersecurity professionals wondering if insights from the infosec world were considered.

Adapting to Legislative Demands: Insights on Cyber Security Compliance in Critical Infrastructure

Welcome to Razorwire, the podcast dedicated to exploring the complex and evolving world of cyber security legislation. I'm your host, Jim, and in today's episode, we delve into the intricate landscape of cyber security legislation with our guests Steve Applegate and Phil Tonkin from Dragos.