In this highly connected world, cybersecurity threats are inevitable. With more devices connecting to the internet, and the daily conducts of our lives slowly shifting into the digital space, people with ill intentions can find new ways to exploit vulnerabilities and carry out cyber-attacks. Fortunately, there is something we can do to protect ourselves, and that is understanding what the future of cybersecurity holds.
Lynx proudly announces our selection as a National Best and Brightest Companies to Work For winner for the third consecutive year. This award recognizes companies that excel at employee relations, use innovation to motivate employees, implement creative compensation programs and more. Winners will be recognized by the National Association for Business Resources (NABR) at the National Best and Brightest Summit – Illuminate 2021 symposium and awards gala on March 24-26 2021, Dallas, Texas.
Originally written and published by Kevin Howarth of NTSC (NTSC.org)
If a theme emerged in the National Technology Security Coalition’s (NTSC) recent conversation with Aric K. Perminter, Chairman and Founder of Lynx Technology Partners, it’s that CISOs are seeking services and solutions that enable simplification, automation, and integration of strategic, operational, and IT risk management processes and data. As a security visionary and leader, Perminter guided Lynx Technology Partners through its founding in 2009 into a multimillion-dollar information security and risk management company. As chairman of the Board of Directors, Perminter is responsible for formulating and executing long-term strategies and interacting with clients, employees, and other stakeholders. During his 25-year career, Perminter has held a wide variety of leadership positions across key parts of information technology businesses—including serving as Lynx’s CEO through August 2015.
October does not only mean we get to enjoy pumpkin spice lattes and hot apple cider, but it is also National Cyber Security Awareness Month (NCSAM). According to National Initiative for Cybersecurity Careers & Studies (NICCS), this years’ theme is “Own it, Secure it, Protect it”. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA) co-lead the NCSAM initiative each year (NCSAM Toolkit).
A risk-based determination of whether – and how – to conduct remote assessments of vendors
Expert Contributors: Angela Dogan, Lynx Technology Partners and Andrew Hout, Shared Assessments
Given how much time and money virtual assessment of vendors can save companies and their third party risk management programs, it may be surprising to learn that cost and convenience should have little, if anything to do, with determining whether a risk assessment should be performed in person or remotely.
Many of you may have read the recent article by Mary K. Pratt, contributing writer, TechTarget titled, Top 10 CISO Concerns for 2019 Span a Wide Range of Issues. If you haven’t, check out the link later in this post, it’s worth the read. Pratt outlined, through a series of interviews with top CISOs, the top ten concerns dominating the CISO’s agenda this year.
With scrutiny on companies intensifying as data breaches become a matter of when, not if, the subject of Third Party Risk Management (TPRM) enters the cybersecurity spotlight more and more. A November 2018 Opus and Ponemon Institute study noted “59 percent of companies said they have experienced a data breach caused by one of their vendors or third parties. In the U.S., that percentage is even higher at 61 percent – up 5 percent over last year’s study and a 12 percent increase since 2016.” Yet, despite this reality, a July 2018 CrowdStrike report notes “fewer than a third (32 percent) of respondents’ organizations have vetted all of their suppliers, new or existing, over the past 12 months.”
Topics: Third Party Risk Management
An abstract form our highly anticipated MSSP paper, What is the Business Case for MSSP?
The National Institute of Standards and Technology (NIST) advises that similar to financial and reputational risk, poorly managed cybersecurity risk may negatively affect performance and place an organization at risk by reducing its ability to innovate. Decision makers and executives are repeatedly experiencing losses due to their inability to be fully knowledgeable about properly managing cybersecurity risk and complying with guidelines of the established frameworks (such as following some of the key elements of the NIST Cyber Security Framework).
There’s a huge misconception in our industry today that a GRC platform is the end all be all to Third Party Risk Management (TPRM). This is so not true! The key to an effective, results driven, TPRM Program is to take the time to lay a solid risk-based foundation. History has shown, that if you just go purchase a tool and haven’t laid a solid foundation, the tool will not give you the results you’re looking to achieve. Regulatory bodies and Industry standards are embracing this philosophy as well. This process can be tedious and time consuming in the beginning but once complete, your result is a mature TPRM program that is ready to be transitioned into any GRC platform.
Topics: Third Party Risk Management