Conversations in Risk-Based Security

Doug Yarabinetz

Recent Posts

Top Ten CISO Concerns for 2019 Validated

Posted by Doug Yarabinetz on Jul 17, 2019 11:12:45 AM

Many of you may have read the recent article by Mary K. Pratt, contributing writer, TechTarget titled, Top 10 CISO Concerns for 2019 Span a Wide Range of Issues.  If you haven’t, check out the link later in this post, it’s worth the read.  Pratt outlined, through a series of interviews with top CISOs, the top ten concerns dominating the CISO’s agenda this year.

Read More

Topics: CISO

2018 Best and Brightest Companies to Work For

Posted by Doug Yarabinetz on Jan 14, 2019 12:11:21 PM

Lynx proudly announces their selection as a National Best and Brightest Companies to Work For winner. This award recognizes companies that excel at employee relations, use innovation to motivate employees, implement creative compensation programs and more. Winners will be recognized by National Association for Business Resources (NABR) at the National Best and Brightest Summit – Illuminate 2019 symposium and awards gala on September 15-17, at the Renaissance Chicago Downtown Hotel, located at 1 W Wacker Drive, in Chicago, IL.

Read More

Strategic Compromise Allows Attackers to Undermine Supply Chain

Posted by Doug Yarabinetz on Jul 9, 2018 2:24:51 PM

One-Fifth Of Enterprise Respondents Reported A Third-Party Breach according to Forrester's Top Cybersecurity Threats of 2018.

Strategic Compromise Will Allow Attackers To Undermine Your Supply Chain

Your partners are also under threat: 21% of global enterprise network security decision makers have experienced a security incident involving a third party . Third-party risk is frequently discussed as an exposure due to data shared with partner companies and data processors. This type of downstream risk can sometimes put people in mortal danger as with the TigerSwan breach, where a third party leaked resume information for foreign nationals that included admissions of their complicity with US forces and home contact information.  Too frequently, supply chain issues that are upstream to your organization are ignored and incidents go unnoticed and unpublicized.
Read More

Topics: cybersecurity

GDPR: Europe Privacy Law That’s Changing the Landscape

Posted by Doug Yarabinetz on May 16, 2018 11:11:05 AM

For those of you with a keen eye or a particular attention to detail, you may have noticed privacy policy changes over the last few months on many popular websites. This is all part of the preparation for the General Data Protection Regulation (GDPR) that goes into effect May 25th, 2018. This affects all companies around the globe that deal with the data from citizen’s in any of the 28 countries in the European Union (EU). From the smallest online retailer to global behemoths, no one is given an exemption from the GDPR. This means many businesses are faced with the choice to comply or stop dealings with EU citizens, which isn’t an option for most.

Read More

Why Cybersecurity Should Be A Top Priority For Small Businesses

Posted by Doug Yarabinetz on May 10, 2018 3:34:04 PM

Every year, far too many businesses are compromised by cybercriminals, and each time, important data and sensitive information are accessed and exploited. In all situations, cybercriminals will use their best technology to steal data and even the finances of big businesses.

Read More

Topics: cybersecurity

End of Year Compliance Requirements: Are you Prepared?

Posted by Doug Yarabinetz on Nov 21, 2017 10:38:53 AM

Many industries face ever changing compliance requirements that they must maintain to continue smooth business operations. Three industries in particular face end of year mandates that require fast action if they haven’t already taken the steps to comply. Law enforcement, nuclear energy and government suppliers are all dealing with a December 31st deadline to meet these compliance rules.

Read More

Topics: CJIS Security Policy, CJIS Compliance, CJI, DFARS, Milestone 8, NIST 800-171

Are You Prepared for and Compliant with the CJIS Security Policy?

Posted by Doug Yarabinetz on Oct 26, 2017 1:19:02 PM

Everyone with access to CJI is subject to be audited to ensure compliance with applicable statutes, regulations and policies. This Policy applies to every individual—contractor, private entity, noncriminal justice agency representative, or member of a criminal justice entity—with access to, or who operate in support of, criminal justice services and information. That means you!

Read More

Topics: CJIS Security Policy, CJIS Compliance, CJI

Healthcare Industry Case Study: Cybersecurity and Risk Management

Posted by Doug Yarabinetz on Aug 1, 2017 2:42:41 PM

Many companies in the healthcare market struggle with compliance projects and finding the time and knowledgeable resources, as-well-as the budget, to adhere to government regulations in a timely manner.

Read More

Topics: Risk Management, cybersecurity, compliance mandates, FISMA Compliance

Swiss Product Manufacturer Partners with Lynx To Sell Lucy!

Posted by Doug Yarabinetz on Jul 21, 2017 12:20:36 PM

ZURICH (20.7.2017) LUCY Security is growing and innovating: Certified partner in the US now delivers new anti-ransomware scenarios with LUCY V3.6. With approximately 25% of sales, the US market represents the most important market area for the Swiss product manufacturer.

The IT risk, compliance and cybersecurity company, Lynx Technology Partners, (LYNX) strengthens Lucy's existing presence in the US market.

Read More

Topics: Security, cybersecurity

Risk Management Insights at the 2017 Shared Assessments Summit

Posted by Doug Yarabinetz on Jun 14, 2017 9:50:02 AM

From June 26 to June 29 in Arlington, Virginia, Lynx Technology Partners team members will be among the top global risk experts discussing best practices for third party risk management at the 10th annual Shared Assessments Summit.

Read More

Topics: Vendor Risk Management, Shared Assessments Summit, Third Party Risk Management