Friction has existed between IT departments and Security Operations for years. If turf wars and business silos are not the cause, the lack of collaboration and communication will often lead to disharmony between the two. The left hand should know what the right hand is doing and vice versa, but that can only happen if the problems between them are acknowledged and addressed. Check out our recent conversation where Lynx CEO Gina Mahin and Steven Bay, Director of Security Operations and Threat Intelligence at Security On-Demand, discuss how Integrated Risk Management can bring a ceasefire to this friction and turn these teams into partners working toward the common goal of protecting the business.
A Ceasefire in the War Between IT and Security Operations
Topics: Risk Management, Security, cybersecurity, Shadow IT, Risk Integration, Integrated Risk Management
Integrated Risk Management: Above and Beyond Risk Mitigation
Topics: Security
Swiss Product Manufacturer Partners with Lynx To Sell Lucy!
ZURICH (20.7.2017) LUCY Security is growing and innovating: Certified partner in the US now delivers new anti-ransomware scenarios with LUCY V3.6. With approximately 25% of sales, the US market represents the most important market area for the Swiss product manufacturer.
The IT risk, compliance and cybersecurity company, Lynx Technology Partners, (LYNX) strengthens Lucy's existing presence in the US market.
Topics: Security, cybersecurity
Managing IT risk is part of running any business these days. Regardless of what business you’re in, understanding IT risk can help you increase network security, reduce management costs and achieve greater compliance. Corporate leaders who fail to identify, assess and mitigate IT risk are setting themselves up for serious security breaches and financial losses down the road.
Topics: Risk Management, Security, cybersecurity
Vendor Risk Management: An Educational Webinar Series
Organizations increasingly rely on vendors and third-party relationships for strategic business advantage. Ensuring that these partnerships don’t create an unacceptable risk requires a complete vendor risk management approach. Join Michael Rasmussen, The GRC Pundit at GRC 20/20, as he presents this 3 part educational webinar series on managing vendor risk and compliance.
Topics: Risk Management, Security, Vendor Risk Management
Lynx Risk Manager Integrates with Lieberman Software’s ERPM
Lynx Technology Partners and Lieberman Software recently announced an integration module for Lynx Risk Manager (LRM) which imports privileged account information from Lieberman Software’s Enterprise Random Password Manager (ERPM) and immediately updates security control scores in LRM. These scores form the basis for continuous measurement of password-related security risks, as well as compliance to a wide range of regulatory frameworks.
Topics: Risk Management, Security, GRC
Bobby Dominguez to Examine IT Risk Programs and the NIST CSF
Bobby Dominguez will discuss the operationalization of the NIST Cyber Security Framework to create an information technology risk program at ISACA’s CSX 2016 North America conference in Las Vegas, Nevada, USA, 17-19 October 2016. CSX 2016 North America will be focused on practical cybersecurity solutions and guidance, tailored to every level of a security professional’s career.
Topics: Risk Management, Security, NIST Cyber Security Framework, cybersecurity
Lynx Technology Partners and EC Council to Host Pittsburgh Training for Certified Chief Information Security Officer (CCISO)
Due to the high demand for live training and this course in particular, Lynx Technology Partners and the EC Council are partnering to bring CCISO to Pittsburgh October 24 through October 28, 2016. The event will be hosted at the Lynx Technology Partners offices at 309 Smithfield Street in downtown Pittsburgh.
Join the ranks of infosec managers making the leap to executive infosec leadership with Live CCISO Training!
Topics: Risk Management, Security, cybersecurity, Certified CISO Training, GRC
Escape Spreadsheet Hell: Transitioning Your GRC Efforts
In many organizations the genesis of their GRC efforts can be traced back to a few isolated projects that were quick responses to external factors (e.g. scrambling to pass the first PCI audit, “What’s this HIPAA thing all about?”, etc.) To get these projects going people turned to their reliable “universal tool”, the spreadsheet. Suddenly spreadsheets became assessment tools, scoring programs, aggregated databases, report generators, etc. For these projects, spreadsheet-based GRC rose to the occasion and saved the day!
Topics: Risk Management, Security, cybersecurity, GRC
If you’re in business in 2016, your company most likely uses Cloud services of one kind or another. You can’t avoid the Cloud, whether personally or for your business. But with so much empowerment and capability, who wants to avoid it? However, security remains a serious concern for organizations using the Cloud. The shared, on-demand nature of Cloud computing compounds the ever present the possibility of security breaches. Mitigating Cloud risks starts by identifying the top security threats you may face.
At a recent EC Council Global CISO Forum, Lynx Technology Partners' Chief Strategy & Security Officer, Bobby Dominguez, described some of the most relevant threats as well as risk mitigation techniques that may help your organization function in the Cloud and reduce the risks associated with this rapidly growing technology segment. The discussion not only focused on the threats, but potential solutions, including specific examples of what you can do to manage your Cloud risks. The presentation titled, "The Cloud 9 Threats & Solutions in 2016," can be found here.