B2B SaaS startups struggle to comply with regulatory requirements. There are many evolving standards that require documentation and controls. These requirements overwhelm startups, to the …
Phishing emails are the single most significant attack vector facing consumers and businesses today. Companies routinely report on metrics that do not adequately define their …
This Critical Challenge Project (CCP) addresses the lack of understanding inherent between private industry and the DoD and argues that not just a whole of …
The aim of this paper is to identify any inadequacies in cybersecurity training, specifically regarding the training of executive leadership. To accomplish this, this paper …
This guide aims to be a valuable place for in-house counsel to go to help them understand and address cybersecurity concerns. In-house counsel does not …
The U.S. military continues to struggle with a system to properly integrate cyber planning into military operations, effectively communicate cyber capabilities to commanders, and cross …
Information security is rightfully considered a risk management function today as organization’s must align deployed protections to their information security risks and maintain an appropriate …
This Critical Challenge Project is focused on Cybersecurity and Boards of Directors. It highlights six lenses of research: Wall Street Journal CyberPro Research, Proxy Statement …
This critical challenge project is intended to address the workforce shortage by evaluating the transformation that needs to occur including the evaluations of barriers to …
This paper explores the questions about whether we can trust security ratings and how we should use them. My approaches are, (1) describing traditional and …
By partnering directly with critical infrastructure providers, the National Guard Bureau can help build a stronger cybersecurity posture that enables quicker cyber incident detection and …
Technology brought incredible convenience to nearly every aspect of our lives. Means of communication, transportation, entertainment, and even exercise is very different. Innovation came with, …
This Critical Challenge Project is focused on Cybersecurity and Boards of Directors. It highlights six lenses of research: Wall Street Journal CyberPro Research, Proxy Statement …
Cybersecurity data is robust and prevalent. However, that data rarely correlates with vulnerabilities, security controls, and threats for a target environment. As cyber-related threats continue …
As Cybersecurity concerns grow across our interconnected world, companies are required to consider how to best manage Cyber risk and insure business continuity. Given the …
Security awareness training is a proven method used by many companies to help employees gain a better understanding of the information security risks affecting their …
The questionnaire-based assessments of vendors’ cybersecurity posture have proven to be inefficient and ineffective. This single-point-in-time assessment does not capture fully and continuously the cybersecurity …
The recent proliferation of technology (i.e., internet usage, mobile devices, or IOT devices) has resulted in an unprecedented accumulation of data. Complete, timely, secure, and …
To remain both competitive and compliant, organizations need consistent approaches for how to understand and consume data, what to collect, and how to manage it. …
Cybersecurity planning remains the purview of a few high-cost experts, but urgently needs to be available to the many non-expert managers of small-to-medium businesses (SMBs) …
Vulnerabilities in software are commonplace. They are routinely exploited by bad actors to cause harm and for financial gain. As software is increasingly embedded in …
Large organizations with multiple product teams that are geographically spread over many time zones need to ensure that product secrecy and confidentiality is maintained while …
The rapid adoption of the cloud is resulting in an increasing insider threat attack surface, as cloud service providers and the supply chain must now …
The purpose of this research paper is to explore the impact of Artificial Intelligence on cybersecurity, specifically the defensive aspects of cybersecurity. This paper is …
The proliferation of cybersecurity issues over the past decade is challenging the norms of corporate governance. This specific study focuses on three critical areas the …
In 2016, consumers in the United States lost almost $9 billion due to payment card fraud. Despite continued news of payment card breaches impacting millions …
The Mozambique National Cybersecurity Strategy does not elaborate a governance framework, thus, this paper looks at two essential questions: (1) what governance model should the …
This paper seeks to explore the challenges and the impact of a fragmented vendor risk assessment process across the financial industry. This is an important …
The total hedge fund industry capital globally in 2Q18 was a record $3.235 trillion, spread among 8,335 funds. Despite this global hedge fund footprint, the …
This paper explores several use cases where human microchipping is enabling humans and businesses to interact with their digital surroundings faster and more efficiently in …
This paper presents the findings of unprecedented field research in social engineering and information security awareness training. A cross section of private companies and government …
Cybersecurity involves an “all-hands on deck” approach from multiple stakeholders at every institution. In order to successfully implement this approach, organizations must adjust their cultures …
Each of the states are working towards improving their cyber incident responses but are not collaborating as much as needed. There are many efforts that …
This document provides a quick perspective about the security and privacy provided through the use, and connectivity, of the Internet of Things (IoT) which may …
Cybersecurity incidents are a key enterprise risk for any organization that owns or maintains confidential information and these incidents have the potential to create significant …
Small and medium businesses (SMB) comprise approximately 99% of the economy in most developed countries. Because they represent the lion’s share of the economy, their …
The origins of the privacy profession as primarily a legal and compliance discipline has clearly changed, and while the arm of privacy professionals who are …
Organizations are having difficulties finding cyber talent. They also need to change the perception that cyber security is just an IT problem. By creatively making …
Mobile devices such as smartphones have replaced Personal Computers (PCs) to become the primary computing devices for many users due to the rapid advance of …
An educational animated video developed to augment the DoD cybersecurity training programs, sensitize DoD members to current cybersecurity threats, and improve the overall cybersecurity posture …
An educational animated video developed to augment the DoD cybersecurity training programs, sensitize DoD members to current cybersecurity threats, and improve the overall cybersecurity posture …
The human factor is a crucial element for cybersecurity. One of the ways the cyber attackers are successfully exploiting our systems is by manipulating innocent …
In recent years global agriculture has faced adversity; with trials including climate change, water scarcity, loss of arable land, and even workforce shortages. Amidst this …
This paper examines at common machine learning applications in the physical security environment which collect data and what that means in light of GDPR by …
Individuals are largely unaware of the legal extent to which the TOS agreement permit internet companies to monetize their personal data profiles. This paper reveasl …
Data has changed how we do business. To keep pace, Privacy Offices are quickly turning to technological solutions to modernize and automate their existing operations. …
An educational animated video developed to augment the DoD cybersecurity training programs, sensitize DoD members to current cybersecurity threats, and improve the overall cybersecurity posture …
The paper provides design and security considerations for Software-Defined Wide Area Network (SD-WAN) transformation from a traditional Multi-Protocol Label Switching (MPLS) WAN architecture. The rapid …