Conversations in Risk-Based Security

Live Webinar "Managed Security - How to Boost Your Security Posture Through Outsourcing Security to Experts"

Posted by Doug Yarabinetz on Mar 7, 2017 7:42:50 PM

Join us for the webinar "Managed Security - How to Boost Your Security Posture Through Outsourcing Security to Experts featuring research from the 2017 Cybersecurity Trends Spotlight Report published by the Information Security Community on LinkedIn in partnership with Crowd Research.

Read More

Topics: cybersecurity, GRC, Risk Management

Lynx Risk Manager Integrates with Lieberman Software’s Enterprise Random Password Manager

Posted by Doug Yarabinetz on Dec 22, 2016 9:51:15 AM

Lynx Technology Partners and Lieberman Software recently announced an integration module for Lynx Risk Manager (LRM) which imports privileged account information from Lieberman Software’s Enterprise Random Password Manager (ERPM) and immediately updates security control scores in LRM.  These scores form the basis for continuous measurement of password-related security risks, as well as compliance to a wide range of regulatory frameworks.

Read More

Topics: GRC, Security, Risk Management

Lynx Technology Partners and EC Council to Host Pittsburgh Training for Certified Chief Information Security Officer (CCISO)

Posted by Doug Yarabinetz on Sep 20, 2016 5:13:53 PM

Due to the high demand for live training and this course in particular, Lynx Technology Partners and the EC Council are partnering to bring CCISO to Pittsburgh October 24 through October 28, 2016.  The event will be hosted at the Lynx Technology Partners offices at 309 Smithfield Street in downtown Pittsburgh. 

Join the ranks of infosec managers making the leap to executive infosec leadership with Live CCISO Training!

Read More

Topics: Certified CISO Training, cybersecurity, GRC, Risk Management, Security

Escape Spreadsheet Hell:  Transitioning Your GRC Efforts

Posted by Don Leatham on Sep 16, 2016 8:34:50 PM

In many organizations the genesis of their GRC efforts can be traced back to a few isolated projects that were quick responses to external factors (e.g. scrambling to pass the first PCI audit, “What’s this HIPAA thing all about?”, etc.)  To get these projects going people turned to their reliable “universal tool”, the spreadsheet.  Suddenly spreadsheets became assessment tools, scoring programs, aggregated databases, report generators, etc.  For these projects, spreadsheet-based GRC rose to the occasion and saved the day!

Read More

Topics: Security, cybersecurity, GRC, Risk Management