09 Apr Third Party Risk Management Toyotas Are Better Than Audis Because Toyota’s Vendor Risk Management Is Better January 19, 2024 By John Verry It’s always interesting to me to see how different industries handle vendor risk management. Often when we see a wave of leads/opportun... Continue reading
03 Mar ISMS Consulting The Cybersecurity Canon: Books Every Cybersecurity Professional Should Read March 3, 2015 By Richard Barrus Rick Howard, the Chief Security Officer at Palo Alto Networks, has a project going called The Cybersecurity Canon. It’s a list of “must... Continue reading
04 Dec ISMS Consulting Background Checks: Recommended But Not Required December 4, 2014 By John Verry A client recently asked me about the need to perform background checks on employees as part of their ISO 27001 compliance efforts. Bein... Continue reading
10 Nov ISO 27001 Certification | Category - Pivot Point Security Does ISO 27001:2013 Adequately Address Threats from Government Agencies? January 18, 2024 By Richard Barrus A new version of the ISO 27001 information security standard came out about a year ago. While the new release addresses some of the ch... Continue reading
22 Oct ISO 27001 Certification | Category - Pivot Point Security Here’s Why Using Information Security Policy Templates for ISO 27001 Certification Isn’t A Good Idea January 18, 2024 By Richard Barrus Clients often ask me whether they can make their lives easier by using information security policy templates to document compliance wit... Continue reading