B2B SaaS startups struggle to comply with regulatory requirements. There are many evolving standards that require documentation and controls. These requirements overwhelm startups, to the …
Phishing emails are the single most significant attack vector facing consumers and businesses today. Companies routinely report on metrics that do not adequately define their …
This Critical Challenge Project (CCP) addresses the lack of understanding inherent between private industry and the DoD and argues that not just a whole of …
The aim of this paper is to identify any inadequacies in cybersecurity training, specifically regarding the training of executive leadership. To accomplish this, this paper …
This guide aims to be a valuable place for in-house counsel to go to help them understand and address cybersecurity concerns. In-house counsel does not …
The U.S. military continues to struggle with a system to properly integrate cyber planning into military operations, effectively communicate cyber capabilities to commanders, and cross …
Information security is rightfully considered a risk management function today as organization’s must align deployed protections to their information security risks and maintain an appropriate …
This Critical Challenge Project is focused on Cybersecurity and Boards of Directors. It highlights six lenses of research: Wall Street Journal CyberPro Research, Proxy Statement …
This critical challenge project is intended to address the workforce shortage by evaluating the transformation that needs to occur including the evaluations of barriers to …
This paper explores the questions about whether we can trust security ratings and how we should use them. My approaches are, (1) describing traditional and …
By partnering directly with critical infrastructure providers, the National Guard Bureau can help build a stronger cybersecurity posture that enables quicker cyber incident detection and …
Technology brought incredible convenience to nearly every aspect of our lives. Means of communication, transportation, entertainment, and even exercise is very different. Innovation came with, …
This Critical Challenge Project is focused on Cybersecurity and Boards of Directors. It highlights six lenses of research: Wall Street Journal CyberPro Research, Proxy Statement …
Cybersecurity data is robust and prevalent. However, that data rarely correlates with vulnerabilities, security controls, and threats for a target environment. As cyber-related threats continue …
As Cybersecurity concerns grow across our interconnected world, companies are required to consider how to best manage Cyber risk and insure business continuity. Given the …
Security awareness training is a proven method used by many companies to help employees gain a better understanding of the information security risks affecting their …
The questionnaire-based assessments of vendors’ cybersecurity posture have proven to be inefficient and ineffective. This single-point-in-time assessment does not capture fully and continuously the cybersecurity …
The recent proliferation of technology (i.e., internet usage, mobile devices, or IOT devices) has resulted in an unprecedented accumulation of data. Complete, timely, secure, and …
To remain both competitive and compliant, organizations need consistent approaches for how to understand and consume data, what to collect, and how to manage it. …
Cybersecurity planning remains the purview of a few high-cost experts, but urgently needs to be available to the many non-expert managers of small-to-medium businesses (SMBs) …