How can company boards ensure they are addressing escalating cyber threats? Positioned at opposite ends of the business, board members and security executives often struggle to collaborate effectively ...
When an advisory firm is seeking a tech vendor or vetting an existing one, the most common request is to see its SOC 2 report — a widely used compliance report that shows how that vendor manages ...
The upward trajectory of merger and acquisition (M&A) activity in 2024 is already unmistakable. Bolstered by a backdrop of stabilized interest rates and decelerating inflation, coupled with pent-up ...
No business sector is immune from the threat of a cyber attack. Scattered Spider is just one example of an organized group that has initiated attacks within different industries, including two US ...
The Security Think Tank looks at platformisation, considering questions such as how CISOs can distinguish between a truly integrated platform and 'integration theater, and how to protect unified ...
Jongkil Jay Jeong does not work for, consult, own shares in or receive funding from any company or organization that would benefit from this article, and has disclosed no relevant affiliations beyond ...
CISOs have put cyber on the boardroom agenda. Now it’s time to move the conversation forward.