Consumer data privacy protection is a global concern – driving new regulations around the world. Many U.S. companies are multi-national, and have already begun work to increase security and transparency in meeting the requirements of GDPR. In general, if a company is in compliance with GDPR (or are on their way in meeting those requirements), then that company is fairly far along in meeting the requirements of CCPA.
CCPA: Thinking Beyond Compliance = Competitive Edge
Topics: CCPA
The ‘Culture’ of Risk Integration; When Integration Eats GRC for Lunch
Culture is a funny thing. We all know we need it…we need more of it…we need it at the center of decision-making…we discuss it in meetings…we’ve even created executive positions for it…BUT can we define it? Culture is fairly intangible – sorta the, “I know it when I see it” thing.
And we all know – that’s not enough.
Key Cybersecurity Predictions to Look Out for This 2020
In this highly connected world, cybersecurity threats are inevitable. With more devices connecting to the internet, and the daily conducts of our lives slowly shifting into the digital space, people with ill intentions can find new ways to exploit vulnerabilities and carry out cyber-attacks. Fortunately, there is something we can do to protect ourselves, and that is understanding what the future of cybersecurity holds.
Lynx Has Been Named a 2019 Best and Brightest Companies
Lynx proudly announces our selection as a National Best and Brightest Companies to Work For winner for the third consecutive year. This award recognizes companies that excel at employee relations, use innovation to motivate employees, implement creative compensation programs and more. Winners will be recognized by the National Association for Business Resources (NABR) at the National Best and Brightest Summit – Illuminate 2021 symposium and awards gala on March 24-26 2021, Dallas, Texas.
Optimizing the CISO’s Gameplan: Governance, Compliance, & Diversity
Originally written and published by Kevin Howarth of NTSC (NTSC.org)
If a theme emerged in the National Technology Security Coalition’s (NTSC) recent conversation with Aric K. Perminter, Chairman and Founder of Lynx Technology Partners, it’s that CISOs are seeking services and solutions that enable simplification, automation, and integration of strategic, operational, and IT risk management processes and data. As a security visionary and leader, Perminter guided Lynx Technology Partners through its founding in 2009 into a multimillion-dollar information security and risk management company. As chairman of the Board of Directors, Perminter is responsible for formulating and executing long-term strategies and interacting with clients, employees, and other stakeholders. During his 25-year career, Perminter has held a wide variety of leadership positions across key parts of information technology businesses—including serving as Lynx’s CEO through August 2015.
Topics: compliance, governance risk
Integrated Risk Management: Above and Beyond Risk Mitigation
Topics: Security
Own it. Secure it. Protect it. Cybersecurity Awareness Month
October does not only mean we get to enjoy pumpkin spice lattes and hot apple cider, but it is also National Cyber Security Awareness Month (NCSAM). According to National Initiative for Cybersecurity Careers & Studies (NICCS), this years’ theme is “Own it, Secure it, Protect it”. The Cybersecurity and Infrastructure Security Agency (CISA) and the National Cyber Security Alliance (NCSA) co-lead the NCSAM initiative each year (NCSAM Toolkit).
Topics: BeCyberSmart, NCSAM
A risk-based determination of whether – and how – to conduct remote assessments of vendors
Expert Contributors: Angela Dogan, Lynx Technology Partners and Andrew Hout, Shared Assessments
Given how much time and money virtual assessment of vendors can save companies and their third party risk management programs, it may be surprising to learn that cost and convenience should have little, if anything to do, with determining whether a risk assessment should be performed in person or remotely.
Many of you may have read the recent article by Mary K. Pratt, contributing writer, TechTarget titled, Top 10 CISO Concerns for 2019 Span a Wide Range of Issues. If you haven’t, check out the link later in this post, it’s worth the read. Pratt outlined, through a series of interviews with top CISOs, the top ten concerns dominating the CISO’s agenda this year.
Topics: CISO
Third Party Risk Management: Just the Right Thing to Do
With scrutiny on companies intensifying as data breaches become a matter of when, not if, the subject of Third Party Risk Management (TPRM) enters the cybersecurity spotlight more and more. A November 2018 Opus and Ponemon Institute study noted “59 percent of companies said they have experienced a data breach caused by one of their vendors or third parties. In the U.S., that percentage is even higher at 61 percent – up 5 percent over last year’s study and a 12 percent increase since 2016.” Yet, despite this reality, a July 2018 CrowdStrike report notes “fewer than a third (32 percent) of respondents’ organizations have vetted all of their suppliers, new or existing, over the past 12 months.”
Topics: Third Party Risk Management