The Wall Street Journal
Lessons From a Data Breach
Jamil Farshchi, chief information security officer at Equifax, and Jo De Vliegher, chief information officer at Norsk Hydro, give their firsthand account of suffering a data breach and how they responded.
IDG TECHtalk
Reviewing software risks on your Windows network
Set aside some time to inventory and analyze the software and settings on your network to identify risks.
National Institute of Standards and Technology
Attribute Based Access Control
Attribute Based Access Control (ABAC) is a security mechanism that allows organizations to authorize an individual's access to networks and resources based on granular attributes, such as title, division, certificates, training, etc.
The Wall Street Journal
Tightening Up on Cybersecurity
Cybersecurity leaders explore what measures companies need to take following the U.S. government’s prescriptive approach to the cybersecurity practices of the companies categorized as part of the nation’s “critical infrastructure.”
The Wall Street Journal
Cyber Priorities for Congress
Congresswoman Yvette Clarke (D., N.Y.), explains the most pressing cybersecurity issues items on the legislative agenda, ranging from threats arising from the Russian war in Ukraine to the use of personal data by large technology companies.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Why Risk Management Fails
This video explains why risk management fails. This clip is from the chapter "Why Risk Management Fails" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains why risk management fails.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Why Do We Need Risk Management
This video explains the need for risk management. This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the need for risk management.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Who Uses Risk Management
This video explains who uses risk management. This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - What Is Risk Management
This video explains risk management. This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - The Risk Management Lifecycle
This video explains the risk management lifecycle. This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Benefits of a Risk Register
This video explains the benefits of a risk register. This clip is from the chapter "Risk Register" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the risk register.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Section Introduction - Why We Need Risk Management
This video introduces you to the section. This clip is from the chapter "Why We Need Risk Management" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the need for risk management.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Qualitative Risk Assessments
This video explains qualitative risk assessments. This clip is from the chapter "Risk Assessments" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk assessments.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Sample Risk Assessments
This video explains sample risk assessments. This clip is from the chapter "Risk Assessments" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk assessments.
National Institute of Standards and Technology
The Cybersecurity Framework
Learn more about why organizations of all sizes and types should be using NIST’s voluntary Cybersecurity Framework, which is based on existing standards, guidelines, and best practices. Created through collaboration between industry,...
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - The Risk PMO, Champions and Advocates
This video explains risk PMO, champions, and advocates. This clip is from the chapter "Risk Monitoring and Control" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk monitoring and...
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Risk Avoidance and Acceptance
This video explains risk avoidance and acceptance. This clip is from the chapter "Risk Responses and Controls" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk responses and controls.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - The Role of Risk Appetite and Tolerance
This video explains the role of risk appetite and tolerance. This clip is from the chapter "Risk Identification" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to identify risk.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - What Is Risk Register
This video explains risk register. This clip is from the chapter "Risk Register" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the risk register.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Risk Register Walk-Through
This video explains risk register walk-through. This clip is from the chapter "Risk Register" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains the risk register.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Risk Monitoring Tools
This video explains risk monitoring tools. This clip is from the chapter "Risk Monitoring and Control" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk monitoring and control.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Two Methods of Risk Monitoring
This video explains two methods of risk monitoring.
This clip is from the chapter "Risk Monitoring and Control" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk monitoring and...
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - Section Introduction - Risk Monitoring and Control
This video explains the section. This clip is from the chapter "Risk Monitoring and Control" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains risk monitoring and control.
Curated Video
Risk Management 101 for IT Professionals Essential Concepts - What Is a Risk?
This video explains what risk means. This clip is from the chapter "Understanding Risk" of the series "Risk Management 101 for IT Professionals: Essential Concepts".This section explains how to understand risk.