Risk Management Program? It's Easy If You Do It Correctly

Risk can severely impact your ability to operate or grow the organization. Whether it’s implementing a new technology, managing business operations, or ensuring ongoing compliance - risk is in everything we do. Yet, very few organization have an effective Risk Management Program (RMP).

Read More
Stella Bridges Stella Bridges

Core Principles of a Resilient and Adaptable Cybersecurity Program

The COVID-19 pandemic has dramatically increased the use of digital assets (such as mobile devices, Bring Your Own Devices (BYOD), cloud solutions, and other emerging technologies) which in turn has strained cybersecurity operations. Companies that do not know their cybersecurity status are exposed to risks that can be detrimental to their survival.

Read More
Stella Bridges Stella Bridges

Guide to HITRUST CSF Certification

HITRUST Common Security Framework (CSF) is a robust security and privacy framework, built upon other existing, industry accepted standards and regulations and provides a robust set of prescriptive control requirements to support establishment and maintenance of security, privacy, and compliance goals.

Read More

New CISO means new security strategy ...but should it?

During a recent discussion with a CEO of a Health System, he mentioned he had lost faith in his leadership and security team because the cybersecurity strategy keeps changing. “Every time there is a change in leadership, the cybersecurity strategy changes.”

Read More

What is DFARS Compliance (NIST 800-171) and how does it compare to NIST 800-53?

NIST SP 800-171 and NIST SP 800-53, both provide a set of security requirements for protection of information and systems used by the government. The purpose and applicability of the security requirements depends on; 1)    the information to be protected (controlled unclassified information (CUI) vs. classified information) and 2)    the kind of system on which the information is processed, stored, or transmitted (Nonfederal information system vs. federal information system.

Read More

Why you need a security program and how to get started…

A security program serves as a GPS for assessing and managing information security within the organization. This is a living document with strategies that include retaining the right resources, streamlining current processes, and implementing necessary technology.

Read More
Stella Bridges Stella Bridges

How do you measure up? 5 questions to ask before starting a controls assessment (FISMA, HITRUST, HIPAA, SOX, SOC, PCI)

Control assessments such as FISMA, HIPAA, HITRUST, SOX, SOC, and PCI are documentation heavy processes requiring formal documented policies and procedures, implementation of adequate controls, and continuous monitoring processes. This can seem pretty daunting especially without the right expertise and a pressing timeline.

Let us help you get it right the first time!

Read More