Blog

  • Executive Development Module 1: Humanizing Cyber Defense (Recap)

    Executive Development Module 1: Humanizing Cyber Defense (Recap)

    RSI Security recently hosted our first Executive Development Series webinar, Consciousness of Cyber defense, on July 12, 2024. Our founder and managing director, John Shin, developed the concept for the event in collaboration with Vistage, a leading executive coaching organization that serves over 45,000 executives across the world. He started the event by explaining the crucial importance of human awareness of security concepts at the top of organizations.

    Shin also provided an overview of the format for this first module and the overarching structure for the follow-up sessions, encouraging interactivity and audience participation throughout.

    (more…)

  • Who Needs ISO 27001 Certification?

    Who Needs ISO 27001 Certification?

    Determining whether you need to become ISO 27001 certified requires knowing:

    • What the ISO 27001 framework is and why it exists
    • Which locations the framework primarily applies to
    • Which industries require or suggest ISO compliance

    What options are available for comprehensive compliance

     

    (more…)

  • How to Achieve ISO 27001 Certification Efficiently

    How to Achieve ISO 27001 Certification Efficiently

    One way organizations assure partners around the world of their commitment to security and data privacy is by complying with international frameworks like ISO 27001. Complying efficiently requires scoping, implementation, and assessment—or an alternative path through mapping. Are you ready to achieve ISO 27001 certification? Schedule a consultation to find out!

     

    (more…)

  • Physical Security Penetration Testing

    Physical Security Penetration Testing

    Understanding physical penetration testing and how to take advantage of it requires:

    • Knowing what physical pen tests are and the overall approach they take
    • Appreciating how an actual physical penetration test works in practice
    • Scoping best practices into a physical or hybrid pen testing program
    • Comparing physical pen tests against other forms of penetration testing

    (more…)

  • How to Get the Most Out of AI Assisted vCISO Services

    How to Get the Most Out of AI Assisted vCISO Services

    As organizations scale upward, their technological capacities grow exponentially—as do their cyberdefense needs. Hiring a C-suite executive to oversee all cybersecurity concerns is one approach, but a virtual solution is often more efficient, especially if it’s an AI assisted vCISO. (more…)

  • Streamline HIPAA Risk Assessments with HITRUST Certification

    Streamline HIPAA Risk Assessments with HITRUST Certification

    Organizations in and around healthcare can streamline risk assessments in five easy steps:

    • Understanding which regulations apply (i.e., HIPAA, HITRUST, etc.)
    • Scoping out what information and systems need to be assessed
    • Preparing for other niche assessments in the event of a breach
    • Implementing controls from the HITRUST CSF to cover their needs
    • Conducting an official HITRUST assessment for broad compliance

    (more…)

  • Cybersecurity Risks Faced by Corporate Executives: Market Survey Report

    Cybersecurity Risks Faced by Corporate Executives: Market Survey Report

    The survey conducted independently by Ponemon Institute and published in May 2023, explores the significant cybersecurity risks faced by corporate executives in their personal digital lives. The report highlights the gap between corporate cybersecurity measures and the protection needed for executives at home. (more…)

  • Governance, Risk and Compliance (GRC) Framework

    Governance, Risk and Compliance (GRC) Framework

    As your organization implements a governance, risk management, and compliance (GRC) cybersecurity approach, you might be wondering which tools or processes will streamline the process. One place to start is to implement a GRC framework. Read on to learn all about it! (more…)

  • The 4 Phases of Penetration Testing

    The 4 Phases of Penetration Testing

    Penetration testing is one of the most robust security testing tools within any cybersecurity program. When implemented effectively, the four phases of penetration testing will help identify gaps in your IT security and bolster your cyberdefenses. Read on to learn more about the penetration testing phases. (more…)

  • What are the ITIL Incident Management Best Practices?

    What are the ITIL Incident Management Best Practices?

    When it comes to the major incident management best practices, they’re best understood when you zoom out and look at the whole picture.The digitalization of the modern world has forced companies to reevaluate their security posture and how they respond to major incidents like network outages. 

    (more…)