Many organizations know they must have the basics: hire a CISO, perform a risk assessment, and find security vendors to fill up the holes. Unfortunately, these are often mere boxes to check. Impact Makers’ former CISO Cathie Brown offers a few simple considerations in each of those steps that will strengthen your cybersecurity posture, like what to look for in a robust risk assessment and a trustworthy security vendor.
Related Posts








I would like to preface this article with a disclaimer: I am not now, nor have I ever been, nor am I likely to ever be a lawyer. I haven’t even played one on TV so, take what I say with a grain of salt with regards to the legal matters. That said, I am writing from the perspective of what should be rather than what necessarily is.

On Friday May 22nd, at 3 pm, Impact Maker’s Chris Tignor, CISO & Practice Lead of Cybersecurity & Risk Management, will be speaking in a panel discussion on Cybersecurity in the Age of COVID-19: Working from Home. Don’t miss this chance to learn what cybersecurity professionals are most concerned about in the Next Normal.

We understand maintaining delivery agility when your workforce is running remote Agile is critical to your business success.
Unfortunately, circumstances both within and outside of our control often create the need for remote working arrangements. While operating Agile can be a wonderful experience, when quickly altered from physical co-location to remote Agile, there are some challenges that can impede team progress, individual performance, and the overall sense of belonging to a community.

Wednesday marked the beginning of a new decade, and perhaps the beginning of a new era in digital, as the California Consumer Privacy Act (CCPA) went into effect as law. While the CCPA’s statutes are overly burdensome for today’s data-powered Internet economy, the law is a necessary step in restoring balance of power and trust across Internet behemoths, consumers and legislators.