https://www.a-lign.com/
Feb 24, 2026 - A-LIGN is a compliance, cybersecurity, cyber risk and privacy provider. We help navigate the scope and complexity of your specific security needs.
cyber riskcompliancecybersecurityprivacy
https://www.jmir.org/2025/1/e64388/tweetations
Background: Over the last decade, the health care technology landscape has expanded significantly, introducing new and innovative solutions to address health...
internet researchjournalmedicalidentifyingcontextual
https://www.eisneramper.com/services/advisory/cyber-risk/
The foundation of a sound IT risk strategy begins with having proper governance in place. We help you craft a strategic roadmap to put the right practices and...
cyber risk servicesdata privacyampcompliance
https://www.einpresswire.com/article/608615988/digital-trust-pros-highlight-key-priorities-for-2023-in-privacy-cybersecurity-audit-and-risk
Looking ahead to a new year offers a valuable opportunity for digital trust professionals to not only reassess the practices within their own function or
digital trustkey prioritiesproshighlightprivacy
https://www.defendify.com/layered-security/assessments-testing/cybersecurity-risk-assessment-tool/
Dec 19, 2023 - Defendify's Cybersecurity Risk Assessment Tool enables organizations to assess their current cyber program and provides recommendations for improvement.
cybersecurity risk assessmenteasyusetool
https://webnamescorporate.com/cybersecurity-threats/dns-hijacking
Jun 24, 2024 - What is DNS hijacking or DNS poisoning? Understand the risks posed by this attack and protect you business with adequate safeguards.
cybersecurity riskdns hijackingcorporate
https://www.bsigroup.com/pt-BR/insights-and-media/insights/whitepapers/ai-powered-risk-management-solutions-support-cybersecurity-and-build-trust/
Explore how AI-powered risk management solutions can support cybersecurity and build trust, enhancing organizational resilience.
risk management solutionsai poweredcybersecuritybsi
https://saviynt.com/blog/how-companies-use-risk-data-to-guide-cybersecurity-efforts
The new Saviynt and Ponemon Institute report reveals surprising insights into how companies use risk data to guide cybersecurity efforts.
risk datacompaniesuseguidecybersecurity
https://www.cybersecuritydive.com/news/microsoft-warns-3k-exposed-aspnet-machine-keys-at-risk-of-weaponization/739551/
An unknown threat actor recently used an exposed key for code injection cyberattacks.
asp netmachine keysmicrosoftwarnsexposed
https://www.wallix.com/resources/whitepaper/compliance-and-risk-management-simplify-cybersecurity-and-unlock-your-potential-with-wallix/
Nov 13, 2025 - What do our customers think, what is their approach, find out in our WALLIX CUSTOMER VOICE 2024.
risk managementcompliancesimplifycybersecurityunlock
https://riskassociates.com/pci-services/pci-sslc/
Nov 10, 2025 - Risk Associates’ PCI SSLC services assist software vendors, payment service providers, and organizations developing payment software in meeting PCI SSLC...
software securitylifecycle servicepcisslcrisk
https://360advanced.com/
360 Advanced provides managed cybersecurity services improving businesses through information security and compliance. A one stop shop for all your compliance...
advanced cybersecuritycompliancerisk
https://www.eccouncil.org/cybersecurity-exchange/cyber-talks/ai-enabled-cybersecurity-best-practices-what-security-leaders-must-adopt/
Explore best practices to adopt artificial intelligence in cybersecurity by aligning governance, risk management, and operational resilience.
artificial intelligencemanaging riskcybersecuritygovernancethreats
https://www.tripwire.com/state-of-security/cybersecurity-supply-chain-risk-management-cscrm
C-SCRM deals with protecting an organization from cyber-attacks on third parties. It also addresses third parties to those third parties.
supply chain riskunderstandingcybersecuritymanagementscrm
https://www.mercer.com/insights/people-strategy/people-risks-and-business-resilience/cybersecurity-in-european-financial-services/
Discover the 2025 People Risk in Cybersecurity Report, highlighting talent shortages and the need for a people-focused approach in financial services.
financial services sectornavigatingpeopleriskcybersecurity
https://www.deloitte.com/lk/en/about/recognition/analyst-relations/deloitte-named-a-leader-in-worldwide-cybersecurity-risk-management-services-by-idc-marketscape.html
Deloitte has been named a global Leader in the inaugural IDC MarketScape: Worldwide Cybersecurity Risk Management Services 2023 Vendor Assessment.
cybersecurity risk managementdeloittenamedleaderworldwide
https://www.cyberark.com/resources/cyberark-privilege-cloud/ceo-viewpoint-prioritizing-identity-security-to-reduce-cybersecurity-risk
Hear from Udi Mokady, Founder, Chairman and CEO of CyberArk, on his perspective regarding why Identity Security is critical to protect against credential theft...
identity securitycybersecurity riskceoviewpointreduce
https://www.bluemantis.com/services/cybersecurity-risk-management/
Nov 11, 2025 - Strengthen your cybersecurity risk management with Blue Mantis. Our experts deliver automated, scalable, and industry-specific protection you can trust.
cybersecurity risk managementservicesbluemantis
https://www.cybersecuritydive.com/news/third-party-risk-cyberattacks-supply-chain-ey-survey/746877/
The report comes as years of supply chain cyberattacks shine a spotlight on third-party risks.
top listvendor riskstudy findsoperationalimpacts
https://www.csoonline.com/article/4116270/cybersecurity-risk-will-accelerate-this-year-fueled-in-part-by-ai-says-world-economic-forum.html
Jan 13, 2026 - Its annual cybersecurity outlook says cyber resilience is key to lowering that risk, with AI the most significant driver of change for both attackers and...
cybersecurity riskaccelerateyearfueledpart
https://cybersecuritysummit.com/summit/owasp-appsec/
Oct 7, 2025 - This virtual conference, presented in partnership with OWASP, brings together top experts and innovators to explore how artificial intelligence is reshaping...
ai application securitygenampriskofficial
https://www.conference-board.org/publications/AI-risk-disclosures-in-the-S-and-P-500-reputation-cybersecurity-and-regulation
This report provides insight into the issues of AI risk shaping board agendas, investor expectations, and regulatory oversight.
ai riskdisclosurespcybersecurity
https://www.cybersecuritydive.com/news/colonial-pipeline-ransomware-attack/599885/
Security experts warned for years about attacks against critical infrastructure, but one analyst called this the most brazen yet.
colonial pipelinesecurity riskattackembodiesnation
https://www.pingidentity.com/en/resources/blog/post/why-security-fatigue-huge-cybersecurity-risk.html
Security fatigue erodes trust, focus, and compliance. Explore its causes and practical ways to strengthen your digital identity defenses.
cybersecurity riskping identityfatiguehuge
https://www.softwareimprovementgroup.com/cybersecurity-risk-assessment/
Sep 10, 2025 - Identify and mitigate potential risks in your software with SIG's comprehensive Software Risk Assessment services.
cybersecurity risk assessmentsig
https://securityscorecard.com/blog/why-singapores-cybersecurity-risks-are-surging-and-how-to-tackle-third-party-risk/
Dec 2, 2025 - 71.4% of companies in Singapore have experienced a third-party breach. In a recent webinar, security experts analyzed the latest SecurityScorecard research on...
cybersecurity riskstackle
https://www.fortra.com/resources/videos/survey-results-cybersecurity-risk-mitigation-strategies
Watch this to get the results of the Fortra survey on 2018's top cybersecurity risks and mitigation strategies, presented by experts in the cybersecurity field.
risk mitigation strategiesdemandwebinarcybersecurityfortra
https://www.ciodive.com/news/board-members-find-cybersecurity-risk-an-existential-threat/570532/
As cyberthreats rise, board members want to be involved in an issue they say requires more than operational decisions enacted by IT management.
board memberscybersecurity riskcio divefindexistential
https://www.mimecast.com/de/resources/webinars/mimecasts-cyberchats--cybersecurity-2026-human-risk-im-kizeitalter-ep-4/
human riskcybersecurityimep
https://www.fox13now.com/news/national/biggest-cybersecurity-risk-to-u-s-businesses-is-employee-negligence
Studies show the greatest risk for a data breach at a company is employee negligence, but experts say businesses can mitigate cybersecurity risks by training...
cybersecurity riskbiggestemployeenegligence
https://www.rpsgroup.com/services/advisory-and-management-consulting/cybersecurity/
Helping organisations manage cyber risk and strengthen digital resilience through strategic cybersecurity services. Secure your operations and build long-term...
cybersecurity consultingdigital riskservicesresiliencerps
https://www.ey.com/en_au/insights/forensic-integrity-services/how-to-go-beyond-a-preventive-mindset-to-manage-cybersecurity-risk
Businesses increasingly realize they can reduce risk and damages by prioritizing rapid detection of threats and effective incident response.
go beyondpreventivemindsetmanagecybersecurity
https://www.techzine.eu/blogs/security/131608/how-to-balance-cybersecurity-and-innovation-at-an-acceptable-risk/
May 26, 2025 - At the intersection of AI innovation and cybersecurity, organizations must rethink their security strategies. Listen now to learn more.
acceptable riskbalancecybersecurityinnovation
https://outpost24.com/products/
Nov 27, 2025 - Cyber risk management products to limit digital exposure. We help businesses detect & fix the most dangerous threats, before they can be exploited.
risk managementcybersecurityampproducts
https://www.bitdefender.com/en-gb/blog/businessinsights/cybersecurity-review-benefits-outcomes
In a world where cyberattacks are increasingly stealthy, fast-moving, and disruptive, no organization can afford to rely on assumptions.
everyorganizationneedscybersecurityreview
https://www.sans.org/cyber-security-courses/performing-cybersecurity-risk-assessment-training
Explore industry-leading strategies for conducting cybersecurity risk assessments that deliver actionable insights to protect your organization's critical...
cybersecurity risk assessmentsans instituteperforming
https://www.yokogawa.com/hu/solutions/products-and-services/information/safety-solution/plant-security/cybersecurity-lifecycle-management/security-risk-assessment/
Adopting a risk-based approach allows you to assess the strengths and weaknesses of security decisions within a complex operational environment. | Yokogawa...
cybersecurity risk assessmentyokogawahungary
https://armorpoint.com/solutions/managed-risk/
Nov 4, 2025 - Today's businesses require unparalleled risk management. Explore ArmorPoint's Managed Risk solutions to craft a strategy that transforms your...
managed riskcybersecurity managementarmorpoint
https://www.imf.org/en/publications/departmental-papers-policy-papers/issues/2019/09/23/cybersecurity-risk-supervision-46238
This paper highlights the emerging supervisory practices that contribute to effective cybersecurity risk supervision, with an emphasis on how these practices...
cybersecurity risksupervision
https://www.constructionseyt.com/2025/03/cybersecurity-in-construction-how-to-effectively-mitigate-cyber-risk/
Mar 10, 2025 - The construction industry’s reliance on digital data and devices has reshaped the construction process. When used properly, digital technology facilitates
mitigate cyber riskcybersecurityconstructioneffectively
https://www.kiteworks.com/top-data-breaches-report/
Apr 21, 2025 - Discover how data sensitivity trumps record count in 2024's worst data breaches, with exclusive Risk Exposure Index analysis of 4.2 billion compromised...
data breachesrisk exposureindex analysistop
https://www.buzzsprout.com/768839/episodes/3236479
In this part 2 of the podcast when continue the conversation with Jordan Fischer from XPAN Law Group. We covered an array of topics:Risk ProcessesCyber...
cybersecurity riskepisodeprivacylawtimes
https://www.aicpa-cima.com/cpe-learning/publication/reporting-on-an-entitys-cybersecurity-risk-management-program-and-controls-attestation-guide
When you're examining a cybersecurity risk management program and its controls, look to this authoritative guide for interpretive guidance. Includes a...
cybersecurity risk managementreportingentityprogram
https://www.agendadigitale.eu/sicurezza/cti-e-risk-management-guida-pratica-per-una-cybersecurity-proattiva/
Cyber Threat Intelligence e Risk Management: come integrare dati sulle minacce e analisi del rischio per decisioni proattive.
risk managementper unactiguidapratica
https://www.forrester.com/blogs/predictions-2026-cybersecurity-and-risk/
Oct 28, 2025 - In 2026, political instability and new technology will force cybersecurity and risk leaders to adapt. Find out how in our 2026 predictions for cybersecurity...
risk leadersnew techpredictionscybersecuritygrapple
https://regscale.com/blog/enabling-department-of-war-cyber-defense/
Sep 26, 2025 - Discover how RegScale’s platform supports the new Cybersecurity Risk Management Construct (CSRMC) with Continuous Controls Monitoring and automation.
cybersecurity risk managementunderstandingnewconstruct
https://www.securitymagazine.com/articles/98268-cybersecurity-ranked-most-serious-enterprise-risk-in-2022?utm_campaign=On%20The%20Circuit&utm_medium=email&utm_source=Revue%20newsletter
A survey of more than 700 U.S. executives by PricewaterhouseCoopers (PwC) identified top enterprise security and business risks observed in 2022.
enterprise risksecurity magazinecybersecurityrankedserious
https://tunein.com/radio/Stream-How-to-Manage-Risk-Using-the-NIST-Cybersecurity-F-a51589/
Listen to Stream How to Manage Risk, Using the NIST Cybersecurity F here on TuneIn! Listen anytime, anywhere!
manage riskstreamusingnistcybersecurity
https://www.fsiservices.com/blog/healthcare-cybersecurity-cmms
Healthcare cybersecurity risk extends beyond patient data, and into maintenance and asset management. How can your CMMS help?
healthcare cybersecurityrolecmms
https://www.tbmcouncil.org/discover/hot-topics/risk-cybersecurity/
Sep 4, 2025 - Managing Cybersecurity and Compliance as Strategic, Value-Aligned Investments
riskampcybersecuritytbmcouncil
https://www.bsigroup.com/en-IL/insights-and-media/insights/whitepapers/ai-powered-risk-management-solutions-support-cybersecurity-and-build-trust/
Explore how AI-powered risk management solutions can support cybersecurity and build trust, enhancing organizational resilience.
risk management solutionsai poweredcybersecuritybsi
https://www.ispartnersllc.com/cybersecurity-assessment-and-advisory-services/isms-risk-assessment/
We make the ISMS risk assessment process as simple as possible, guiding your organization in improving its security posture. Book a free consultation today.
isms risk assessmentcybersecurity advisory
https://www.mckinsey.com/capabilities/risk-and-resilience/our-insights/the-risk-based-approach-to-cybersecurity?
The most sophisticated institutions are moving from maturity-based to risk-based cybersecurity. Here is how they are doing it.
approachriskbasedcybersecuritymckinsey
https://www.aviationtoday.com/partner-content/cybersecurity-embedded-systems-reducing-risk-pen-testing/
Mar 2, 2020 - Increased aircraft connectivity enables new services such as predictive maintenance, aircraft tracking, and flight data updates. However, it introduces new...
embedded systemsreducing riskpen testingcybersecurityavionics
https://www.ansys.com/resource-center/webinar/systematic-cybersecurity-threat-analysis-and-risk-assessment
Discover a six-step process to help you identify and address cyber vulnerabilities across the entire automotive electronics architecture.
cybersecurity threatrisk assessmentsystematicanalysisansys
https://www.enterprisesecuritymag.com/cxoinsight/cybersecurity-excellence-through-risk-management-and-resilient-teams-nid-4475-cid-163.html
Jeremy Thompson is serving as the senior director of security at Highline Warren.
risk managementcybersecurityexcellenceresilientteams
https://riskassociates.com/data-protection-services/gdpr-compliance/
Nov 10, 2025 - Risk Associates’ GDPR Services ensure compliance with EU data protection standards for organizations worldwide. Safeguard personal data, meet regulatory...
general data protectiongdpr servicesregulationriskassociates
https://www.morganlewis.com/ru/pubs/2025/08/cppa-board-finalizes-new-rules-on-admt-cybersecurity-audits-and-risk-assessments
The California Privacy Protection Agency (CPPA) board unanimously voted on July 24, 2025 to finalize a package of regulations related to automated...
new rulescybersecurity auditscppaboardadmt
https://www.trendmicro.com/en_us/research/22/d/proactive-cyber-risk-management-strategies.html
Explore how a risk-based cybersecurity approach is critical to proactively stop dynamic, ever-evolving threats.
trend microembracingriskbasedcybersecurity
https://www.cybersecuritydive.com/spons/third-party-risk-and-why-it-matters/599261/
If not monitored or tracked, third-party remote access can expose networks to cyber threats and allow entry to bad actors who can wreak havoc on an...
third party riskcybersecurity divematters
https://www.aip.org/fyi/federal-science-bill-tracker/118th/house-of-representatives-5786
To establish in the National Nuclear Security Administration a Cybersecurity Risk Inventory, Assessment, and Mitigation Working Group.
cybersecurity riskestablishnnsainventoryassessment
https://www.lsu.edu/business/accounting/cia.php/profile-viewer.php?un=gsumner
The world's first and best university-based internal auditing program has expanded to include a greater focus on cyber risk and ESG reporting.
cybersecurity risk managementinternal auditingcenter
https://www.knowbe4.com/press/lack-of-regular-cybersecurity-awareness-training-puts-organisations-at-risk
KnowBe4 research shows organizations without regular security training face higher cyber risks and employee vulnerability to attacks.
cybersecurity awarenesslackregulartrainingputs
https://www.morganlewis.com/pubs/2023/03/sec-proposes-cybersecurity-incident-reporting-and-broker-dealer-cyber-risk-management-requirements
The US Securities and Exchange Commission (SEC) issued a notice of proposed rulemaking (the Proposal) on March 15 that would require SEC-regulated investment...
cybersecurity incidentbroker dealerreportingrisk
https://www.cybersecuritydive.com/news/ciso-gains-corporate-cyber-risk/712684/
A report from Moody’s Ratings shows CISOs and other senior-level cyber executives have become key decision makers within the C-suite.
ciso rolecorporate recognitionshowssignificantgains
https://riskassociates.com/security-testing/source-code-review/
Nov 10, 2025 - Risk Associates’ Source Code Review service provides a thorough line-by-line analysis of application code to uncover hidden security risks. Strengthen your...
source code reviewtesting servicesampriskassociates
https://cylera.com/resources/healthcare-third-party-risk-webinar/
Jul 24, 2025 - Learn how healthcare organizations can reduce third-party risk and defend your healthcare network from vendor-based threats.
third party riskhealthcare cybersecuritymanaging
https://www.trendmicro.com/en_gb/research/22/d/proactive-cyber-risk-management-strategies.html
Explore how a risk-based cybersecurity approach is critical to proactively stop dynamic, ever-evolving threats.
trend microembracingriskbasedcybersecurity
https://www.brighttalk.com/webcast/11673/609638
69% of organizations said they experienced at least one cyberattack resulting from an exploit of an unknown or unmanaged asset such as software, cloud-b...
asset managementidentifyriskunauthorizeddevices