View All Resources CRO Named One of the Nations Top Risk Management Solutions 10 Fastest Growing Risk Management Solutions The Technology Headlines is a knowledge platform for industry…Kip BoyleSeptember 11, 2018
Cybersecurity ThreatsSecurity Risk AsessmentView All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 5 Fire, Flood, and Cybersecurity In some respects, cybersecurity is not that different than protecting your…Kip BoyleSeptember 11, 2018
Podcasts Cyber Risk Management and Attorney Client Privilege Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleSeptember 4, 2018
Podcasts California Consumer Privacy Act (CCPA) Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice…Kip BoyleAugust 21, 2018
View All Resources The Anatomy of a Hack: The Internet Age of Criminals – Part 1 The Internet Age of Criminals In 2015 the global cost of cybersecurity failures was five…Kip BoyleAugust 14, 2018
Podcasts What is GDPR? Kip Boyle, CEO of Cyber Risk Opportunities, and Jake Bernstein, JD and CyberSecurity Practice Lead…Kip BoyleAugust 8, 2018
View All Resources The Upside of Cyber Risk Although movies and newspapers would have us believe that cyber risk only has a negative…Kip BoyleAugust 7, 2018
Company NewsView All Resources Why I Work in Cybersecurity I've been working in the field of cybersecurity for more than 20 years, which is…Kip BoyleJuly 31, 2018
Cybersecurity Executive ToolkitSecurity Risk AsessmentView All Resources Set Up a Score Collection Workflow (Part 2) I’m continuing my long series of posts that describe how to implement an information security…Kip BoyleJuly 24, 2018
Podcasts How the FTC Defines “Reasonable Cybersecurity” Kip Boyle, CEO of Cyber Risk Opportunities, talks with Jake Bernstein, JD and CyberSecurity Practice…Kip BoyleJuly 24, 2018