PinnedAlex BodrykStrengthening Cyber Resilience with the NIST Cybersecurity Framework 2.0In today’s interconnected digital landscape, organizations face an ever-increasing array of cyber threats that can disrupt operations…Jun 1Jun 1
Alex BodrykTaking A Second Chance For Your Security Posture With Detect Function of NIST Cybersecurity…After protective security controls fail or didn’t cover the attack vector enough, detective security controls provide a vital second chance…3d ago3d ago
Alex BodrykGetting Preventive Security Right with Protect Function of NIST Cybersecurity Framework 2.0After we understood which particular assets make sense to protect it comes time for the next step — implementing preventive controls…Sep 29Sep 29
Alex BodrykGetting Preventive Security Right with Protect Function of NIST Cybersecurity Framework 2.0After we understood which particular assets make sense to protect it comes time for the next step — implementing preventive controls…Sep 22Sep 22
Alex BodrykGetting Preventive Security Right with Protect Function of NIST Cybersecurity Framework 2.0After we understood which particular assets make sense to protect it comes time for next step— implementing preventive controls. Today…Sep 15Sep 15
Alex BodrykSecuring The Right Thing with Identify Function of NIST Cybersecurity Framework 2.0Businesses acquire, build, upgrade, decommission and sell assets to serve consumers’ needs in healthcare, payments, connectivity, food and…Sep 8Sep 8
Alex BodrykOverSecured? 5 Steps to Align Cyber Resiliency Posture and Your Customer HappinessWhile most of the businesses struggle to manage their cyber resilience some are quite good in both business and cyber resilience…Sep 1Sep 1
Alex BodrykHow to Plan for Withstanding a Cyber Attack on Market Maker Company — Part 2Today market volatility creates enormous business opportunities for the finance world, and determined cybercriminals are starting to…Aug 25Aug 25
Alex BodrykHow to Plan for Withstanding a Cyber Attack on Market Maker Company — Part 1Today market volatility creates enormous business opportunities for the finance world, and determined cybercriminals have started to…Aug 18Aug 18
Alex BodrykEleven Practices for Happy and Business-Oriented Vulnerability ManagementYour vulnerability management doesn’t have to be an agony for everyone involved — Global Security, Business Information Security Officers…Aug 11Aug 11