Remove eBook Remove Insurance Remove Security
article thumbnail

Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy

The Security Ledger

In this Spotlight Podcast, a companion to our new eBook, Rethinking Third Party Cyber Risk Management, we go deep on the topic of building a mature third party cyber risk program with Dave Stapleton the Director of Assessment. Download our new ebook: Rethinking Third-Party Cyber Risk Management. Read the whole entry. »

Risk 40
article thumbnail

More articles about information management than any sane person should write

AIIM

Over 100 eBooks, Guest articles, and Tip Sheets from the past year or so -- 107 of them to be exact. Information Privacy and Security: GDPR is Just the Tip of the Iceberg. Getting Ahead of the Disruption Curve is Critical for Insurance Companies. Information Security and Compliance Through the Prism of Two Industries.

ECM 93
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Zero Trust Is a Journey and Businesses Have Many Rivers to Cross

Thales Cloud Protection & Licensing

Organizations are facing challenging times when it comes to securing their corporate assets, systems, networks and data. For Zero Trust security, the solution to the trust crisis problem is to “never trust, always verify”. Michael Ball, Virtual Chief Information Security Officer, TeamCISO. Trust is now a risk.

article thumbnail

The Road to Zero Trust

Thales Cloud Protection & Licensing

But behind the scenes, this emergence of often untrusted devices (BYOD) and an increased adoption of unsanctioned applications (a trend called “Shadow IT”) has led to security nightmares for IT departments. The path to a Zero Trust posture is not linear, and the tall claims by security vendors often cloud the decision-making.

Risk 77