
by: Larry Kinkaid Defining the scope of your information security management system (ISMS) is a crucial step in your security and compliance journey. The scoping statement is a core element…
by: Larry Kinkaid Defining the scope of your information security management system (ISMS) is a crucial step in your security and compliance journey. The scoping statement is a core element…
According to the New England Institute of Technology, 58% of CISO advisors believe the problem of not having an expert cyber staff will worsen in the future. While developing a…
By: Teddy VanGalen, Senior Consultant, Cyber Risk Advisory Prioritizing and handling security issues are part of a continuous management plan within your organization’s security program. Like a yearly doctor’s exam…
At BARR Advisory, we believe in determining the why before proposing the how, and that careful planning is imperative to help our clients achieve their business objectives. That’s why, when…
With the Center for Internet Security (CIS) recently releasing version eight of its controls, consolidating the previous 20 controls into 18, let’s dive into the final set of six controls…
With the Center for Internet Security (CIS) recently releasing version eight of its controls, consolidating the previous 20 controls into 18, let’s dive into the second set of six controls…
The Center for Internet Security (CIS) recently released version eight of its controls, consolidating the previous 20 controls into 18 (more on this here). Let’s dive into the first six…
The Center for Internet Security (CIS) recently released version eight of its controls, consolidating the previous 20 controls into 18. This latest list is organized by activity, rather than by…
By Mitch Evans, Director of CISO Advisory, and Larry Kinkaid, Senior Consultant, CISO Advisory With the increase in data breaches, businesses are more cautious than ever when it comes to…