PinnedAlex BodrykStrengthening Cyber Resilience with the NIST Cybersecurity Framework 2.0In today’s interconnected digital landscape, organizations face an ever-increasing array of cyber threats that can disrupt operations…Jun 1Jun 1
Alex BodrykSecuring The Right Thing with Identify Function of NIST Cybersecurity Framework 2.0Businesses acquire, build, upgrade, decommission and sell assets to serve consumers’ needs in healthcare, payments, connectivity, food and…20h ago20h ago
Alex BodrykOverSecured? 5 Steps to Align Cyber Resiliency Posture and Your Customer HappinessWhile most of the businesses struggle to manage their cyber resilience some are quite good in both business and cyber resilience…Sep 1Sep 1
Alex BodrykHow to Plan for Withstanding a Cyber Attack on Market Maker Company — Part 2Today market volatility creates enormous business opportunities for the finance world, and determined cybercriminals are starting to…Aug 25Aug 25
Alex BodrykHow to Plan for Withstanding a Cyber Attack on Market Maker Company — Part 1Today market volatility creates enormous business opportunities for the finance world, and determined cybercriminals have started to…Aug 18Aug 18
Alex BodrykEleven Practices for Happy and Business-Oriented Vulnerability ManagementYour vulnerability management doesn’t have to be an agony for everyone involved — Global Security, Business Information Security Officers…Aug 11Aug 11
Alex BodrykList of Cybersecurity Blogs in the UAECybersecurity blogs deliver insight, support innovation and foster better decision-making. This is especially important for development of…Aug 4Aug 4
Alex BodrykThe Taxonomy of CISO RolesThe CISO position has become a coveted role in the ever-evolving business landscape, turning into somewhat of a “hot potato” within…Jul 28Jul 28
Alex BodrykHow To Avoid Crowdstrike-style Tech MeltdownThe meltdown has impacted the lives of millions of people worldwide. It is crucial to consider how to prevent such situations in the…Jul 21Jul 21
Alex BodrykTargeting Third-Party Cyber Resilience with NIST Cybersecurity Framework 2.0Supply chains and third parties have long been integral parts of the value creation process. This allows organizations to be flexible…Jul 14Jul 14