
By: Brett Davis Today’s modern enterprise is often fragmented, with businesses relying extensively on third-party vendors and partners. While these relationships are critical for the success of organizations of all…
By: Brett Davis Today’s modern enterprise is often fragmented, with businesses relying extensively on third-party vendors and partners. While these relationships are critical for the success of organizations of all…
By Cody Hewell and Brett Davis A report by Proofpoint indicated that nearly 70% of CISOs feel their organization is at risk of experiencing a material cyber attack in the…
The Securities and Exchange Commission (SEC) recently announced charges against SolarWinds Corporation and its chief information security officer (CISO), Timothy G. Brown. The charges include fraud and internal control failures…
by: Larry Kinkaid Defining the scope of your information security management system (ISMS) is a crucial step in your security and compliance journey. The scoping statement is a core element…
According to the New England Institute of Technology, 58% of CISO advisors believe the problem of not having an expert cyber staff will worsen in the future. While developing a…
By: Teddy VanGalen, Senior Consultant, Cyber Risk Advisory Prioritizing and handling security issues are part of a continuous management plan within your organization’s security program. Like a yearly doctor’s exam…
At BARR Advisory, we believe in determining the why before proposing the how, and that careful planning is imperative to help our clients achieve their business objectives. That’s why, when…
With the Center for Internet Security (CIS) recently releasing version eight of its controls, consolidating the previous 20 controls into 18, let’s dive into the final set of six controls…
With the Center for Internet Security (CIS) recently releasing version eight of its controls, consolidating the previous 20 controls into 18, let’s dive into the second set of six controls…