Is Your Risk Assessment Authentication & Access Ready?
In August, the FFIEC released new guidance titled “Authentication and Access to Financial Institution Services and Systems”. Because the guidance...
The cybercriminals are still on top of their game, changing targets and tactics. The work-from-home revolution continues and the drive for automation continues across industries. All of these changes affect cybersecurity risk and those profiles should be considered in our information security plan.
This points to the need for risk assessments to be a regular practice, not only an annual exercise, and the examiners agree. We have heard many calls for ongoing risk assessments, especially when implementing new security tools that require privileged access, citing the recent supply chain attacks as the poster child for understanding and limiting access to the minimum necessary and ensuring proper controls are in place.
So, how do we go about this?
If you need help with your risk assessments or understanding the process, please contact us at support@bedelsecurity.com.
Inherent and Residual Risk
https://www.bedelsecurity.com/blog/inherent-and-residual-risk
The Virtual CISO Whitepaper
https://www.bedelsecurity.com/the-virtual-ciso-whitepaper
The Most Underrated Control in Information Security
https://www.bedelsecurity.com/blog/the-most-underrated-control-in-information-security
IT Risk Assessment vs. Vendor Risk Assessment Simplified
https://www.bedelsecurity.com/blog/it-risk-assessment-vs.-vendor-risk-assessment-simplified
In August, the FFIEC released new guidance titled “Authentication and Access to Financial Institution Services and Systems”. Because the guidance...
It’s easy to use the terms “Information Technology (IT)” and “Information Security (IS)” interchangeably. They are equally important but serve...