Conversations in Risk-Based Security

What is the Business Case for MSSP?

Posted by Rajni Goel on Sep 4, 2018 10:59:24 AM

Much has been written about the benefits of an MSSP, especially if you are a big organization.  It allows for a consistent, centralized, and transparent view into your organization’s security platform.  But, how do you decide if an “in-house” security management program is effective enough? What is the cost-benefit analysis when deciding to budget expenses for in-house versus out-sourcing?

Read More

Topics: MSSP, cybersecurity

Strategic Compromise Will Allow Attackers To Undermine Your Supply Chain

Posted by Doug Yarabinetz on Jul 9, 2018 2:24:51 PM

One-Fifth Of Enterprise Respondents Reported A Third-Party Breach according to Forrester's Top Cybersecurity Threats of 2018.

Strategic Compromise Will Allow Attackers To Undermine Your Supply Chain

Your partners are also under threat: 21% of global enterprise network security decision makers have experienced a security incident involving a third party . Third-party risk is frequently discussed as an exposure due to data shared with partner companies and data processors. This type of downstream risk can sometimes put people in mortal danger as with the TigerSwan breach, where a third party leaked resume information for foreign nationals that included admissions of their complicity with US forces and home contact information.  Too frequently, supply chain issues that are upstream to your organization are ignored and incidents go unnoticed and unpublicized.
Read More

Topics: cybersecurity

Practice Cyber Combat on a Cyber Range

Posted by Joseph Wilson on Jun 28, 2018 11:38:36 AM

Cyber security is a skill based occupation.  The only way to improve a cybersecurity expert skill set, is by accumulating hands-on experience.  Similar to fighter pilots, who don’t often face the challenges and threats of the real world , training cybersecurity experts can be effective only  by simulating hyper-realistic scenarios which allows cybersecurity individuals and teams to face a real threat, and improve their skills based on the experiences.

Read More

Topics: cybersecurity, cyber range

Why Cybersecurity Should Be A Top Priority For Small Businesses

Posted by Doug Yarabinetz on May 10, 2018 3:34:04 PM

Every year, far too many businesses are compromised by cybercriminals, and each time, important data and sensitive information are accessed and exploited. In all situations, cybercriminals will use their best technology to steal data and even the finances of big businesses.

Read More

Topics: cybersecurity

Healthcare Industry Case Study: Cybersecurity and Risk Management

Posted by Doug Yarabinetz on Aug 1, 2017 2:42:41 PM

Many companies in the healthcare market struggle with compliance projects and finding the time and knowledgeable resources, as-well-as the budget, to adhere to government regulations in a timely manner.

Read More

Topics: compliance mandates, FISMA Compliance, Risk Management, cybersecurity

Swiss Product Manufacturer Announces Partnership with Lynx Technology Partners To Sell Lucy!

Posted by Doug Yarabinetz on Jul 21, 2017 12:20:36 PM

ZURICH (20.7.2017) LUCY Security is growing and innovating: Certified partner in the US now delivers new anti-ransomware scenarios with LUCY V3.6. With approximately 25% of sales, the US market represents the most important market area for the Swiss product manufacturer.

The IT risk, compliance and cybersecurity company, Lynx Technology Partners, (LYNX) strengthens Lucy's existing presence in the US market.

Read More

Topics: Security, cybersecurity

WHERE IS MY IT RISK?

Posted by Doug Yarabinetz on Mar 21, 2017 12:22:09 PM

Managing IT risk is part of running any business these days. Regardless of what business you’re in, understanding IT risk can help you increase network security, reduce management costs and achieve greater compliance. Corporate leaders who fail to identify, assess and mitigate IT risk are setting themselves up for serious security breaches and financial losses down the road.

Read More

Topics: Risk Management, Security, cybersecurity

Live Webinar "Managed Security - How to Boost Your Security Posture Through Outsourcing Security to Experts"

Posted by Doug Yarabinetz on Mar 7, 2017 7:42:50 PM

Join us for the webinar "Managed Security - How to Boost Your Security Posture Through Outsourcing Security to Experts featuring research from the 2017 Cybersecurity Trends Spotlight Report published by the Information Security Community on LinkedIn in partnership with Crowd Research.

Read More

Topics: cybersecurity, GRC, Risk Management

Bobby Dominguez, Chief Strategy & Security Officer at Lynx Technology Partners, to Examine IT Risk Programs and the NIST CSF at ISACA’s CSX North America Conference

Posted by Doug Yarabinetz on Oct 13, 2016 1:03:19 PM

Bobby Dominguez will discuss the operationalization of the NIST Cyber Security Framework to create an information technology risk program at ISACA’s CSX 2016 North America conference in Las Vegas, Nevada, USA, 17-19 October 2016. CSX 2016 North America will be focused on practical cybersecurity solutions and guidance, tailored to every level of a security professional’s career.

Read More

Topics: NIST Cyber Security Framework, Security, Risk Management, cybersecurity

Lynx Technology Partners and EC Council to Host Pittsburgh Training for Certified Chief Information Security Officer (CCISO)

Posted by Doug Yarabinetz on Sep 20, 2016 5:13:53 PM

Due to the high demand for live training and this course in particular, Lynx Technology Partners and the EC Council are partnering to bring CCISO to Pittsburgh October 24 through October 28, 2016.  The event will be hosted at the Lynx Technology Partners offices at 309 Smithfield Street in downtown Pittsburgh. 

Join the ranks of infosec managers making the leap to executive infosec leadership with Live CCISO Training!

Read More

Topics: Certified CISO Training, cybersecurity, GRC, Risk Management, Security