Cybersecurity Executive ToolkitSecurity Risk AsessmentView All Resources How do companies mitigate data breaches? By mitigate, I assume you mean a company experienced a data breach and now wants…Kip BoyleAugust 20, 2019
Podcasts Why The ASUS Supply Chain Cyberattack Is a Big Deal Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice…Kip BoyleAugust 20, 2019
Podcasts How the blame game that follows big data breaches affects defenders Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice…Kip BoyleAugust 6, 2019
View All Resources Can knowledge in MBA level finance be helpful in any aspect of Cyber Security? Yes. Corporations must make the very best use of their limited budget to manage the…Kip BoyleAugust 6, 2019
View All Resources Is cybersecurity a fun career? It’s fun in the sense that there are always new things to learn, both practical…Kip BoyleJuly 30, 2019
Podcasts Independent broker’s perspective on cyber insurance Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleJuly 23, 2019
View All Resources What are some stories of cybersecurity incidents? Here are five serious, high-profile cyber incidents that you can read about: Stuxnet - Wikipedia…Kip BoyleJuly 23, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsView All Resources Federal Trade Commission Versus Fandango One of the first mobile apps from a third-party to launch on the iPhone was…Kip BoyleJuly 16, 2019
Cybersecurity Executive ToolkitCybersecurity ThreatsSecurity Risk AsessmentView All Resources Federal Trade Commission Versus ASUS In my last post, we discussed how the FTC used its powers in commerce to…Kip BoyleJuly 9, 2019
Podcasts Protecting your accounts payable function from cyberattack Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleJuly 9, 2019