AI Isn’t Autopilot: Why Corporate America Needs a Cyber Risk Reality Check
The race to adopt AI is on — and it’s moving faster than many organizations are prepared for. From...
2 minute read
What San Diego Golf Culture Can Teach Us About Cybersecurity Risk Management
Southern California is known for a lot of things: sun, surf, startups — and yes, golf.
3 minute read
CFO Lunch & Explore Heads to Cardiff
CFO Lunch & Explore: RSVP to join us August 5th at Seaside Market
1 minute read
San Diego Positioned to Lead the Future of Tourism and Business Travel, Says SDTA CFO
SAN DIEGO, CA — At a recent CFO Lunch & Explore event hosted at the San Diego Tourism Authority...
2 minute read
Digital Footprints in the Sand: 10 Cybersecurity Travel Tips to Protect Your Data While on Vacation in San Diego
Last year, San Diego welcomed 32 million visitors. Tourism generated over $1 billion in tax...
3 minute read
Board of Directors,
Threat,
Risk,
Best Practice,
Vulnerability,
Cybersecurity Risk Management (CSRM),
Assessment,
San Diego,
California,
Cybersecurity
Cybersecurity Risk Management 101: A Practical Guide for Modern Leaders
Estimated read time: 5–6 minutes
2 minute read
Risk Acceptance doesn't have to be scary
Conventional thinking in cybersecurity tells us to mitigate every risk you can. Almost every vendor...
2 minute read
From Vulnerability to Visibility: Cybersecurity Risk Management (CSRM) Is a Core Business Strategy
Estimated read time: 6 minutes
2 minute read
The 4 Ways You Can Cope With Cyber Risk
In the last article, we discussed the Cybersecurity Risk Management (CSRM) framework, its benefits...
3 minute read
How to Build Your Company's Cybersecurity Program: A Risk-Based Approach
If you’re like most small to midsize business (SMB) leaders, you’ve asked yourself some version of...
2 minute read
Why the Best Security Partner for SMBs Might Be a Cyber Insurance Provider
By ICE Cybersecurity
2 minute read
ICE and Agility Credit Announce Partnership to Strengthen Cybersecurity for Auto Dealerships
Published first on Jan 18th, 2023, here.We are excited to announce that Agility Credit, a leading...
1 minute read
FTC Safeguards Rule: Auto Dealers Must Comply by June 9th, 2023
Starting June 9th, 2023, the Federal Trade Commission (FTC) will be enforcing the Safeguards Rule,...
2 minute read
Now is the Time to Train Your Employees on Cybersecurity
With the Coronavirus prevention measures in full-effect and millions of workers making the move to...
1 minute read
Guest Keynote Speaker Mark Vifiades - Data Interoperability Standards
Mark Vifiades - Senior advisor, Office of the National Coordinator
1 minute read
Beginning of The COVID-19 Epoch
Ford Winslow, ICE’s CEO, was a guest speaker on Seamless Podcast with Mike Caroll and Darin...
14 minute read
Is Zoom Safe for Work?
Is Zoom Safe for Work?
3 minute read
Cybersecurity Tips for Home Workers
The following tips have been collected over the last two weeks from cybersecurity professionals,...
1 minute read
5 Ways to Protect Your Remote Workforce
Chances are your workforce is remote by now due to the coronavirus pandemic. A shocking 92% of IT...
1 minute read
3 Sessions We’re Excited About at SHIEC 2019
SHIEC’s 2019 Annual Conference is right around the corner. For those making the trip to Maryland...
1 minute read
ICE Joins SHIEC - The Strategic Health Information Exchange Collaborative
Securing the Future of Healthcare Interoperability San Diego, California – ICE Cybersecurity...
1 minute read
Worried About 3rd Party Cyber-Risk? You're not Alone....
After an inspiring discussion of how interoperability is the future for community health at last...
1 minute read
2019 CIE Summit Showcases Technology Helping People
San Diego, CA - 211 San Diego's CIE Summit happening this week in San Diego will be a showcase of...
1 minute read
Penetration (Pen) Testing for SMBs
Security jargon can be very confusing. Scanning, Pen Tests, Red Team Exercises and now Purple...
2 minute read
The Acquired Breach: How to Spot Cyber Risk in Your Acquisition
Your company just acquired another business and things are great. Your market cap is growing,...
2 minute read
Cybersecurity Planning – Part 2 – Needs, Compliance and Threat Analysis
In the first part of cybersecurity planning, we discussed the top-level alignment of your...
2 minute read
Planning for your Cyber-Safe 2019 – Part 1: Where do I begin?
As the turkey is wearing off and the end-of-year shopping season is upon us, I think about all the...
2 minute read
Op-Ed: The Orangeworm Attacks — Why You Should be Worried
In yet another cyberattack aimed at the healthcare industry, a hacker group named Orangeworm...
3 minute read
2018 Winter Olympic Games Cyber Attack is No Laughing Matter
It didn’t take long for the 2018 Winter Olympics to be hacked.
2 minute read
How Bad was the Equifax Data Breach?
New Information Shows the Breach Worse than First Reported How worried should you be about last...
2 minute read
Chinese Tech Companies Were the First to Know About the Intel Chip Flaw
A member of Google’s Project Zero Security Team discovered a flaw that affects computer processors...
1 minute read
3 Ways Ransomware Affects Healthcare Cybersecurity
Ransomware encrypts files and effectively locks users out of their computers and data. Those behind...
1 minute read
6 Cybersecurity Action Steps for Corporate Directors
Equifax Cybersecurity Incident Response Under Investigation Equifax, one of the major...
2 minute read
Topics
- Assessment (1)
- Best Practice (11)
- Board of Directors (5)
- Breach (4)
- California (3)
- Case Studies (1)
- Compliance (8)
- Cybersafety (9)
- Cybersecurity (3)
- Cybersecurity Risk Management (CSRM) (7)
- Healthcare (7)
- News (11)
- Pen Test (1)
- Phishing (1)
- Ransomware (3)
- Remote Work (5)
- Risk (10)
- San Diego (5)
- Threat (5)
- Training (4)
- Vulnerability (7)