Government building in Carson City, Nevada

Nevada Leads by Example in State and Local Government Cyber Security Practices

The International City/County Management Association (ICMA) partnered with the University of Maryland a few years ago on a nationwide survey of local government cyber security practices, including incident response (IR) plans. Among the many interesting data points in the published report was the finding that only 33.7 percent of respondents had a “formal, written plan for recovery from breaches.” Of… Read More

People pointing at servers.

Tech Refresh as Part of an Effective Vulnerability Management Program: Part Three

Servers and Vulnerability Management In part three of our blog series on the importance of keeping technology and operating systems updated as part of your vulnerability management program, I’ll focus on servers. Servers are a critical component to your security plan, just like mobile devices and unsupported operating systems are. Servers provide key support for… Read More

Security in hybrid cloud environments.

Q & A: Common Misconceptions about Security in Hybrid Environments

In advance of our upcoming webinar on “How to Prepare for and Recover from Attacks in Hybrid Enterprise Environments,” Lauren Bellero spoke with the presenters, Macie Thompson, CISSP, Director of Delta Risk’s Incident Response team, and Chris Murphy, CISSP, Director of Solution Architecture Managed Security Services. The team discussed some of the common misconceptions about security… Read More

People typing on phones, tablets

Tech Refresh as Part of an Effective Vulnerability Management Program: Part Two

Mobile Device Vulnerability Management In part two of our blog series on why it’s important to keep technology and operating systems updated as part of your vulnerability management program, I’ll focus on mobile device vulnerability management. This includes mobile computing, with a focus on mobile devices. The popularity of mobile devices, along with how easily they can… Read More

Delta Risk third-party cyber security risk compliance assessment

Third-Party Assessments: What to Expect and Why They Can Benefit You

In this week’s blog we share an overview of third-party assessments for cyber security. We cover why they’re beneficial and what to expect. Lauren Bellero spoke to Sean Falconi, a managing consultant with Delta Risk in risk management and compliance, to get his thoughts on this topic. Sean has performed many third-party assessments covering a wide range… Read More

tech refresh vulnerability management

Tech Refresh as Part of an Effective Vulnerability Management Program: Part One

The topic I’m going to focus on today is updating outdated operating systems and other aspects of tech refresh as part of vulnerability management, which is one of the most critical tasks for a cyber security professional. This task comes in at #3 on the Center for Internet Security’s (CIS) Top 20 control listing. While vulnerability management is listed as a… Read More