Setting Your Roadmap To Success
In this white paper, learn how information security leaders can better communicate to other executives and to the board the value of the cybersecurity program.
Requirements for Security Performance Management
Ed Amoroso and the team at TAG Cyber have published a white paper, “Requirements for Security Performance Management“, explaining the 5 requirements for an SPM solution.
Maturity Assessment, Profile, and Plan
This paper describes a three-step maturity-centric approach – Maturity Assessment, a Profile, and a Plan (MAPP). An information security MAPP empowers the CISO to evaluate, track, report, and strategize the organization’s security priorities.
Interview: How to Identify Critical Information in Your Organization
Our CTO/CISO, Allan Alford, recently joined Charlie Tupitza at America’s SBDC to discuss how vital it is for small and mid-sized businesses to identify what data they have, where it’s stored, and what would happen to their business if the data were stolen or leaked. We think it’s worth 6 minutes of your time!
Assessing Cybersecurity Performance & Maturity
In this interview, Chad Boeckmann, CEO and Founder of TrustMAPP, chats with Ed Amoroso of TAG-Cyber about how TrustMAPP can assess cybersecurity performance and maturity.
Presenting to the Board of Directors
Summarize security vulnerabilities and opportunities to your Board in a way they will find compelling. In this webcast, Malcolm Harkins, Chief Security and Trust Officer for Cymatic, shares his lessons learned in presenting privacy and security risks to a variety of Boards of Directors. He candidly discusses how to deliver a presentation that will resonate with the C-Suite and offers specific examples of what works and what doesn’t.
Making the Case for a Security Investment
Many CISOs have long expressed concern over their inability to obtain resources and funding support for the information security investments needed to provide suitable levels of protection.In this webcast, Malcolm Harkins, Chief Security & Trust Officer at Cymatic and TrustMAPP Board Member, shares examples of strategies and techniques to change the conversation around cyber risks and vulnerabilities to make a compelling business case for security investments.
Understanding Trust and the Economics of Insecurity
Security professionals continue to throw money at security vendors to make up for the shortcomings of their solutions. It’s a strategy that helps the security vendors, but hurts businesses. In this video, Malcom Harkins, CISO at Cymatic, explains the economics of security, how to identify where your current security strategy is flawed, ways to better frame risk and trust, and the steps you should take to redefine your approach to controlling cybercrime.
Looking Past ‘Point-In-Time’ to Understand Security Performance Management
In this recorded webinar, veteran CISOs Ed Amoroso and Malcolm Harkins. A fantastic hour of conversation about security performance management (#SPM)!
Why You Need Your CMMC Certifications NOW
In this recorded webinar, learn what impact CMMC will have on security maturity and compliance assessments in the US Defense Industrial Base (DIB). Featuring Port53 and TrustMAPP.
Data Privacy – Engaging the “C” Suite
In this recorded webinar, TrustMAPP’s VP Solutions Delivery & CPO, Adam Stone, discusses how privacy professionals can have meaningful conversation with their C-Suite and boards. Recorded during PrivacyOC’s online event, Jan. 2021.