White Papers

Setting Your Roadmap To Success

In this white paper, learn how information security leaders can better communicate to other executives and to the board the value of the cybersecurity program.

Requirements for Security Performance Management

Ed Amoroso and the team at TAG Cyber have published a white paper, “Requirements for Security Performance Management“, explaining the 5 requirements for an SPM solution.

Maturity Assessment, Profile, and Plan

This paper describes a three-step maturity-centric approach – Maturity Assessment, a Profile, and a Plan (MAPP). An information security MAPP empowers the CISO to evaluate, track, report, and strategize the organization’s security priorities.


For privacy reasons YouTube needs your permission to be loaded.
I Accept

Interview: How to Identify Critical Information in Your Organization

Our CTO/CISO, Allan Alford, recently joined Charlie Tupitza at America’s SBDC to discuss how vital it is for small and mid-sized businesses to identify what data they have, where it’s stored, and what would happen to their business if the data were stolen or leaked. We think it’s worth 6 minutes of your time!

For privacy reasons YouTube needs your permission to be loaded.
I Accept

Assessing Cybersecurity Performance & Maturity

In this interview, Chad Boeckmann, CEO and Founder of TrustMAPP, chats with Ed Amoroso of TAG-Cyber about how TrustMAPP can assess cybersecurity performance and maturity.

For privacy reasons YouTube needs your permission to be loaded.
I Accept

Presenting to the Board of Directors

Summarize security vulnerabilities and opportunities to your Board in a way they will find compelling. In this webcast, Malcolm Harkins, Chief Security and Trust Officer for Cymatic, shares his lessons learned in presenting privacy and security risks to a variety of Boards of Directors. He candidly discusses how to deliver a presentation that will resonate with the C-Suite and offers specific examples of what works and what doesn’t.

For privacy reasons YouTube needs your permission to be loaded.
I Accept

Making the Case for a Security Investment

Many CISOs have long expressed concern over their inability to obtain resources and funding support for the information security investments needed to provide suitable levels of protection.In this webcast, Malcolm Harkins, Chief Security & Trust Officer at Cymatic and TrustMAPP Board Member, shares examples of strategies and techniques to change the conversation around cyber risks and vulnerabilities to make a compelling business case for security investments.

For privacy reasons YouTube needs your permission to be loaded.
I Accept

Understanding Trust and the Economics of Insecurity

Security professionals continue to throw money at security vendors to make up for the shortcomings of their solutions. It’s a strategy that helps the security vendors, but hurts businesses. In this video, Malcom Harkins, CISO at Cymatic, explains the economics of security, how to identify where your current security strategy is flawed, ways to better frame risk and trust, and the steps you should take to redefine your approach to controlling cybercrime.


Looking Past ‘Point-In-Time’ to Understand Security Performance Management

In this recorded webinar, veteran CISOs Ed Amoroso and Malcolm Harkins. A fantastic hour of conversation about security performance management (#SPM)!

Why You Need Your CMMC Certifications NOW

In this recorded webinar, learn what impact CMMC will have on security maturity and compliance assessments in the US Defense Industrial Base (DIB). Featuring Port53 and TrustMAPP.

Data Privacy – Engaging the “C” Suite

In this recorded webinar, TrustMAPP’s VP Solutions Delivery & CPO, Adam Stone, discusses how privacy professionals can have meaningful conversation with their C-Suite and boards. Recorded during PrivacyOC’s online event, Jan. 2021.