Podcasts Security Outsourcing: Vendor Selection and Management Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleNovember 26, 2019
Cybersecurity Executive ToolkitQuestions & AnswersView All Resources What concept in cyber security do you hate the most and why? Here’s a big problem that bugs me: Most people manage cyber risks the way they manage…Kip BoyleNovember 26, 2019
Cybersecurity Executive ToolkitCybersecurity PolicyNetwork SecurityQuestions & AnswersSecurity Risk AsessmentView All Resources How can cybersecurity leaders minimize human error? There are two main strategies I use when I’m in the role of CISO: Make…Kip BoyleNovember 19, 2019
Podcasts Ransomware Defenses for cities Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleNovember 12, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsNetwork SecurityQuestions & AnswersView All Resources How long, on average, does it take a company’s stock value to recover after a data breach? “Share prices of breached companies hit a low point approximately 14 market days following a…Kip BoyleNovember 12, 2019
Cybersecurity Executive ToolkitNetwork SecurityQuestions & AnswersView All Resources What’s the best password keeper that’s not based online? A journal of blank pages that you keep under lock and key when you’re not…Kip BoyleNovember 5, 2019