By: Teddy VanGalen, Senior Consultant, Cyber Risk Advisory Prioritizing and handling security issues are part of a continuous management plan within your organization’s security program. Like a yearly doctor’s exam…
By: Whitney Perez, Directory of Quality and Compliance and Disha Shah, Associate Consultant for Cyber Risk Advisory If you’re an organization with any type of business endeavor or objective, you’ve…

Ever wondered what a day in the life of an IT auditor looks like? Luckily for you, Senior Consultant Emma Ostrowski is here to walk you through a day in…

By: Angela Redmond, Director of Attest Services Cybersecurity is an ever-changing field. Hackers and cybercriminals are getting smarter and constantly changing their approach, which is why it’s important to stay…

By: Kyle Helles, Head of Attest Having a vision of what you’d like to achieve is important for all strategic business priorities—and cybersecurity is no different. With a constantly evolving…

By: Swathi West and Vince Maduri Partnerships are an important part of any cybersecurity strategy. A cybersecurity partner will look out for your best interests and help fit your organization…

By: Julie Mungai, Cyber Risk Advisory manager Browsers are the gateway to the internet. All the data that we want comes through them and all the data we provide goes…

By: Brett Davis, senior CISO consultant An information security management system (ISMS) is a critical component of every organization. An ISMS consists of the documented set of security controls in…

By: Jeff Hoskins, senior consultant, CISO Advisory According to the 2022 Verizon Data Breach Investigations Report, 82 percent of data breaches had some human element, such as phishing, misused credentials,…

By: Larry Kinkaid, senior consultant, CISO Advisory At every organization, different employees have different responsibilities. In order to be successful and do their job correctly, each employee needs to know…