Remove Cyber Risk Remove eBook Remove Information Security
article thumbnail

Spotlight Podcast: Rethinking Your Third Party Cyber Risk Strategy

The Security Ledger

Third party cyber risk is growing. In this Spotlight Podcast, a companion to our new eBook, Rethinking Third Party Cyber Risk Management, we go deep on the topic of building a mature third party cyber risk program with Dave Stapleton the Director of Assessment. Third party cyber risk is growing.

article thumbnail

The Evolving Legislative and Compliance Landscape: A Roadmap for Business Leaders

Thales Cloud Protection & Licensing

The Cyber Resilience Act complements other legislation, specifically the NIS2 Directive (see below). NIS2 (Network and Information Security Directive) The updated NIS Directive significantly expands the scope and rigor of cybersecurity requirements across the European Union.

Risk 71
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Evolving Legislative and Compliance Landscape: A Roadmap for Business Leaders

Security Boulevard

The Cyber Resilience Act complements other legislation, specifically the NIS2 Directive (see below). NIS2 (Network and Information Security Directive) The updated NIS Directive significantly expands the scope and rigor of cybersecurity requirements across the European Union.

Risk 72
article thumbnail

7 Things Every CISO Needs to Know About PKI

Security Boulevard

With PKI, CISOs and other information security specialists can implement hardware, software, policies, and procedures to better establish, manage, distribute, implement, and protect digital certificates and key policies. See how Zero Touch PKI Can Be Customized to the Exact Security You Need! Read the FREE eBook. "> Off.

CISO 52