Blog

  • The Importance of an Information Security GRC Program

    In today’s interconnected world, businesses face an ever-growing array of cyber threats, from sophisticated attacks to regulatory pressures. With the stakes higher than ever, securing sensitive data, protecting assets, and ensuring compliance with legal and industry requirements are essential components of any successful business strategy. This is where a comprehensive Governance, Risk, and Compliance (GRC)…Read…

  • Launch of vCISO Services with Gilliam Security

    I am excited to announce the launch of our new vCISO services — a game-changing solution designed to elevate your organization’s cybersecurity posture without the need for an in-house, full-time executive. In today’s increasingly digital world, cybersecurity is more critical than ever. Small to mid-sized businesses often face the challenge of securing their data and…Read…

  • Adoption of Compliance Requirements through Continuous Compliance

    Many times several different assessments are required to understand adherence to a policy, regulatory framework, industry requirement, or some other regulation. While none of this difficult, it can result in asking the same question multiple times or fatigue of your auditee. To reduce fatigue and be able to view compliance across the board, as well…Read…

  • Third Party Security Risk Management

    From acquisitions to mergers to software having integrations with systems outside of your organization’s span of control, third party security risk management has never been more important. One of the most famous examples where third party risk management failed was the acquisition of the Starwood brand by Marriott in 2016. Impact of Third Party Risk…Read…

  • Cyber Insurance: To Get Paid or Not Be Paid

    So you have bought cyber insurance. Let’s take a deep breath knowing that you can be assured that you will not be out millions of dollars should your legal team announce your organization has been breached. Or maybe your organization will hear the words, “we are unable to cover your expenses.” Unfortunately, the latter is…Read…

  • Where to Start When Starting with Security

    Security can be intimidating at first. The words “I feel like the sky is falling, just tell me where we need to start” are often said. One of the goals of the security program should be to have a positive employee experience that makes an impact on the organization to disrupt your industry with using…Read…

  • Security through Cloud or On-Premise?

    One of the most common techniques of vendors is to immediately up sell going to the cloud; however, is the cloud always the best choice? To understand the true benefits of the cloud, one must first understand what the cloud is. Often this is alluded to a mega-structure with Fort Knox style security as well…Read…

  • What is Reasonable Security?

    The words “Reasonable Security” often come up in executive meetings to help understand “what do we need to do?”  As a security professional, our goal is to make things as secure based on a risk-based approach but risk can be defined differently based on where one is. In 2019, a big scramble was made by…Read…

  • SOC 2: Why Should I Care?

    Often times an organization is asked “Do you have a SOC 2?” when one wants to find out about an organization’s information security state; however, do we know what benefit that really provides? A SOC 2 Report is a report that helps prospective customers, current and future auditors, investors, and company stakeholders understand the controls…Read…

  • Avoid Being a Cyber-Statistic

    Did you know 6 in 10 small businesses go out of business within six months that fall victim to a cyber attack? Do not let that be you. Read more here to learn how to avoid becoming a cyber-statistic. Read the white paper Avoid Being a Cyber-Statistic to learn more.