RSI Security recently hosted our first Executive Development Series webinar, Consciousness of Cyber defense, on July 12, 2024. Our founder and managing director, John Shin, developed the concept for the…
-
-
Organizations that work closely with the US Military as contractors or vendors often come into contact with sensitive information. Compliance with the CMMC 2.0 standard is required to ensure all…
-
Determining whether you need to become ISO 27001 certified requires knowing: What the ISO 27001 framework is and why it exists Which locations the framework primarily applies to Which industries…
-
One way organizations assure partners around the world of their commitment to security and data privacy is by complying with international frameworks like ISO 27001. Complying efficiently requires scoping, implementation,…
-
Understanding physical penetration testing and how to take advantage of it requires: Knowing what physical pen tests are and the overall approach they take Appreciating how an actual physical penetration…
-
As organizations scale upward, their technological capacities grow exponentially—as do their cyberdefense needs. Hiring a C-suite executive to oversee all cybersecurity concerns is one approach, but a virtual solution is…
-
Organizations in and around healthcare can streamline risk assessments in five easy steps: Understanding which regulations apply (i.e., HIPAA, HITRUST, etc.) Scoping out what information and systems need to be…
-
Cybersecurity Risks Faced by Corporate Executives: Market Survey Report
by RSI Securityby RSI SecurityThe survey conducted independently by Ponemon Institute and published in May 2023, explores the significant cybersecurity risks faced by corporate executives in their personal digital lives. The report highlights the…
-
If your organization is involved in the healthcare industry indirectly, such as through strategic partnerships with healthcare providers, you may be required to sign a business associate agreement. That means…
-
In 2008 the United States defense industry suffered a severe data loss. The resulting chaos galvanized the industry to create one of the most robust cybersecurity frameworks for business, government,…