Stephanie Goetz

3 min read

CrowdStrike and Supply Chain Risk Management—What Can we Learn From this Experience?

Wow, how much technology has changed in the past 15 years? I remember when “vendor” reviews were uncommon, technology was hosted in-house in 95% of businesses, and arguments were made that a bad actor would never make it past the firewall. How about...

Read More

2 min read

Artificial Intelligence–How will it be regulated

Institutions are looking at services using Artificial Intelligence (AI), such as loan decisioning, resume review, and process automation. Using these...

Read More

2 min read

Hacker Psychology

Many of you have probably heard the adage that one of the best ways to catch a criminal is to think like one. Recently, I discovered several articles...

Read More

2 min read

NIST Releases Cybersecurity Framework 2.0

The National Institute for Standards and Technology released an update to its Cybersecurity Framework (CSF) late February. The CSF was originally...

Read More

3 min read

The Three Lines of Defense

We have referenced this concept in blog posts previously related to growing your Information Security Program and ensuring independence in your...

Read More

1 min read

Humans vs. Artificial Intelligence: Who is the better phisher?

What an interesting question and an article published recently gives us the answer, at least for today. Stephanie Carruthers, the chief people hacker...

Read More

2 min read

Five Findings from the 2023 IBM Security Cost of a Data Breach Report

I was reviewing the 2023 IBM Security Cost of a Data Breach Report this week and wanted to share some findings I found interesting. This report is...

Read More

2 min read

NIST Cybersecurity Framework 2.0 Draft Updates

The NIST Cybersecurity Framework (CSF) was initially developed in 2014 and was intended to be a living document, dependent on feedback from...

Read More

2 min read

Business Email Compromise: Attacks Immune to Multi-Factor Authentication

They’ve come back around…those business email compromises, which were all too common in the late 2010s.

Read More

1 min read

Three Options to Implement Phish Resistant Multi-Factor Authentication

Since the pandemic and the rise of work at home, we have become very familiar with Multi-Factor Authentication (MFA). Typically, this is implemented...

Read More