B2B SaaS startups struggle to comply with regulatory requirements. There are many evolving standards that require documentation and controls. These requirements overwhelm startups, to the …
The aim of this paper is to identify any inadequacies in cybersecurity training, specifically regarding the training of executive leadership. To accomplish this, this paper …
The U.S. military continues to struggle with a system to properly integrate cyber planning into military operations, effectively communicate cyber capabilities to commanders, and cross …
This Critical Challenge Project is focused on Cybersecurity and Boards of Directors. It highlights six lenses of research: Wall Street Journal CyberPro Research, Proxy Statement …
This critical challenge project is intended to address the workforce shortage by evaluating the transformation that needs to occur including the evaluations of barriers to …
This paper explores the questions about whether we can trust security ratings and how we should use them. My approaches are, (1) describing traditional and …
By partnering directly with critical infrastructure providers, the National Guard Bureau can help build a stronger cybersecurity posture that enables quicker cyber incident detection and …
This Critical Challenge Project is focused on Cybersecurity and Boards of Directors. It highlights six lenses of research: Wall Street Journal CyberPro Research, Proxy Statement …
The questionnaire-based assessments of vendors’ cybersecurity posture have proven to be inefficient and ineffective. This single-point-in-time assessment does not capture fully and continuously the cybersecurity …
The recent proliferation of technology (i.e., internet usage, mobile devices, or IOT devices) has resulted in an unprecedented accumulation of data. Complete, timely, secure, and …
Vulnerabilities in software are commonplace. They are routinely exploited by bad actors to cause harm and for financial gain. As software is increasingly embedded in …
The total hedge fund industry capital globally in 2Q18 was a record $3.235 trillion, spread among 8,335 funds. Despite this global hedge fund footprint, the …
This paper presents the findings of unprecedented field research in social engineering and information security awareness training. A cross section of private companies and government …
This document provides a quick perspective about the security and privacy provided through the use, and connectivity, of the Internet of Things (IoT) which may …
Small and medium businesses (SMB) comprise approximately 99% of the economy in most developed countries. Because they represent the lion’s share of the economy, their …
The origins of the privacy profession as primarily a legal and compliance discipline has clearly changed, and while the arm of privacy professionals who are …
Organizations are having difficulties finding cyber talent. They also need to change the perception that cyber security is just an IT problem. By creatively making …
In recent years global agriculture has faced adversity; with trials including climate change, water scarcity, loss of arable land, and even workforce shortages. Amidst this …
This paper examines at common machine learning applications in the physical security environment which collect data and what that means in light of GDPR by …
Individuals are largely unaware of the legal extent to which the TOS agreement permit internet companies to monetize their personal data profiles. This paper reveasl …