10 Steps for Establishing an Effective Insider Threat Program
Insider threats continue to be a concern for organizations. New research conducted by Crowd Research Partners, in co- ordination with the LinkedIn Information Security Group, reveals that 74 percent of organizations feel vulnerable to insider threats, while 54 percent of security professionals say insider threats are more common overall.
Can Your Security Team Handle a Breach?
As the problem of lack of preparedness is closely studied, there are a lot of strong reasons for organizations to be concerned. Statistically there is evidence that teams are taking more time to get up to speed on incident response, although the need for effective data breach response requires swifter action. To make improvements to incident response, you need to develop a solid plan, and that plan needs to be practiced and tested.
2017 Cyber Security Trends Report
Crowd Research Partners has released the 2017 Cybersecurity Trends Report, a comprehensive study on current cyber security trends and investment strategies. Delta Risk partnered with the Information Security Community on LinkedIn to develop this report, which surveyed more than 1,900 cyber security professionals about their views on challenges and solutions regarding managed security, security training and certification, application security, threat management, data protection, and more. The report not only offers the latest data points and trends from cyber security professionals, but it also offers valuable benchmark data that can help you measure how your own organization compares with others.
How to Invest Your Cyber Security Training Budget for Maximum ROI
The growing number of global cyber adversaries who can target an unlimited number of people – combined with the number of organizations that lack the basic security measures and employee awareness to thwart such attacks – has made cyber threats a major concern for organizations of all kinds. In response, there’s been a signicant expansion in cyber training offerings. With so many options, however, it can be overwhelming and confusing to someone tasked with developing an effective cyber training program. This challenge is further magnified by the fact that most organizations have limited budgets and must answer to boards and leadership teams that expect a demonstrable return on their cyber training investment.
Cyber Compliance Primer for Healthcare
Under the Health Insurance Portability Act (HIPAA) and the Health Information Technology for Economic and Clinical Act (HITECH), healthcare providers are required to uphold regulatory obligations to avoid costly fines and compromise of electronic patient health information (ePHI).
The Evolution of Cyber Threat Hunting
By adopting the durable, flexible, and holistic definition of hunt as a capability to detect threats steady-state security teams missed, organizations gain direct and indirect benefits. In this white paper, we discuss how hunt should not only be interpreted but how hunt can be implemented. In turn, we’ll also reveal the true value that threat hunting represents for stakeholders and steady-state security teams.
The State of SMB Security Risks
The risk of a single data breach is 63% higher for small and mid-size businesses (SMBs) than their enterprise counterparts. SMBs are typically more challenged than larger organizations to keep up with security, compliance, and risk management demands because they are focused on the strategic growth of their business.
White Paper: Cyber Security Primer for Healthcare
The level of trust we extend to medical professionals is inherently a personal decision: if we hold back information from our healthcare providers, we risk getting less than the best care they can offer. At the same time, the more personal information we provide – particularly in this digital age – the more that private data can be potentially exposed and used with criminal intent.
White Paper: What You Need to Know About Ransomware & HIPAA Compliance
There is no more hedging on whether ransomware incidents should be identified and treated the same way as other data breaches under the Health Insurance Portability and Accountability Act (HIPAA). The United States Department of Health and Human Services Office for Civil Rights (OCR) has stated that ransomware attacks constitute a breach unless there is substantial evidence to the contrary.
White Paper: Cyber Security and The Board of Directors
Recent high-profile, high-impact cyber breaches at some of the largest companies in the U.S. have highlighted the fact that boards of directors need to take an active role in the management of cyber risk. This white paper offers the Delta Risk perspective on how boards, particularly those of financial services firms, should engage in managing cyber security risks, particularly in four key areas.
White Paper: Threats to Client Confidentiality In A Digital Legal World
To protect sensitive information from inadvertent disclosures, destruction, and malicious attacks, law firms must employ sound cyber security practices. No defense is fool-proof, but by instituting proper cyber security protocols, law firms can drastically reduce the effects of an attack or breach.
White Paper: Cyber Due Diligence
In the past, when law firms mishandled privileged client information, they opened the door for direct lawsuits, third-party claims, and insurance litigation. But today, handling sensitive data extends to other fiduciary and legal obligations. Firms are held to regulatory, professional, and ethical standards that are enforced by governing bodies. Lawyers and legal organizations need to practice cyber due diligence that goes beyond the bare minimum.
White Paper: Cyber Security Primer for Banking and Finance
As stated in a recent issue of the FDIC’s Supervisory Insights, the risks presented by cyber attacks have become “one of the most critical challenges [in the last decade] facing the financial services sector due to the frequency and increasing sophistication of cyber attacks.” In just a year’s time, from 2014 to 2015, the occurrence of security incidents increased 38 percent as reported in a survey of 10,000 security, IT, and executive personnel. Just as concerning, the attackers perpetrating these breaches were able to compromise the victim organization within a matter of minutes in 60 percent of cases.
White Paper: Top 10 Cyber Incident Pain Points: Are You Prepared?
Regardless of how many security controls are placed on a network and the components that go into making a network operate, there will always be vulnerabilities in a connected world. So, what do you do in an environment that allows for such risk of compromise? One of the best methods of protecting organizations is by ensuring that response capabilities are effective and efficient, and one of the most valuable steps in strengthening a response capability is learning from others’ experiences. This white paper discusses the pain points that organizations grapple with when responding to incidents, and how they can address them.