B2B SaaS startups struggle to comply with regulatory requirements. There are many evolving standards that require documentation and controls. These requirements overwhelm startups, to the …
Phishing emails are the single most significant attack vector facing consumers and businesses today. Companies routinely report on metrics that do not adequately define their …
This Critical Challenge Project (CCP) addresses the lack of understanding inherent between private industry and the DoD and argues that not just a whole of …
The aim of this paper is to identify any inadequacies in cybersecurity training, specifically regarding the training of executive leadership. To accomplish this, this paper …
This guide aims to be a valuable place for in-house counsel to go to help them understand and address cybersecurity concerns. In-house counsel does not …
The purpose of this CCP is to analyze the financial viability of Coastal Medical's population health management investments over a five-year period for Coastal365, a …
The U.S. military continues to struggle with a system to properly integrate cyber planning into military operations, effectively communicate cyber capabilities to commanders, and cross …
Information security is rightfully considered a risk management function today as organization’s must align deployed protections to their information security risks and maintain an appropriate …
This Critical Challenge Project is focused on Cybersecurity and Boards of Directors. It highlights six lenses of research: Wall Street Journal CyberPro Research, Proxy Statement …
This critical challenge project is intended to address the workforce shortage by evaluating the transformation that needs to occur including the evaluations of barriers to …
This paper explores the questions about whether we can trust security ratings and how we should use them. My approaches are, (1) describing traditional and …
By partnering directly with critical infrastructure providers, the National Guard Bureau can help build a stronger cybersecurity posture that enables quicker cyber incident detection and …
Technology brought incredible convenience to nearly every aspect of our lives. Means of communication, transportation, entertainment, and even exercise is very different. Innovation came with, …
This Critical Challenge Project is focused on Cybersecurity and Boards of Directors. It highlights six lenses of research: Wall Street Journal CyberPro Research, Proxy Statement …
Cybersecurity data is robust and prevalent. However, that data rarely correlates with vulnerabilities, security controls, and threats for a target environment. As cyber-related threats continue …
As Cybersecurity concerns grow across our interconnected world, companies are required to consider how to best manage Cyber risk and insure business continuity. Given the …
Security awareness training is a proven method used by many companies to help employees gain a better understanding of the information security risks affecting their …
The questionnaire-based assessments of vendors’ cybersecurity posture have proven to be inefficient and ineffective. This single-point-in-time assessment does not capture fully and continuously the cybersecurity …
The recent proliferation of technology (i.e., internet usage, mobile devices, or IOT devices) has resulted in an unprecedented accumulation of data. Complete, timely, secure, and …