Compass IT Compliance Blog

Vendor Risk Management: Information Security Responsibilities

Vendor Risk Management: Information Security Responsibilities

Welcome back! This article serves as part two in my Vendor Risk Management blog series, continuing the discussion on some important factors of creating and renewing third-party contracts.

Read Story

“Fake It ‘Til You Make It” Doesn't Work in Cybersecurity

A classroom with wooden seats and a large map

“Fake it ‘til you make it” – a term that I have heard a thousand times and have probably used before and never thought much of it. That’s until I heard my 14-year-old say it. Let me give you a little context – my son is a freshman in high school and has been in six different schools s …

Read Story

Breweries – Can they be Hacked?

Breweries – Can they be Hacked?

100 bottles of beer on the wall, 100 bottles of beer! Has anyone thought about what goes into making beer? I recently received my “Professional Craft Brewing” certification from Johnson & Wales. Throughout the program we went out and worked in commercial breweries.

Read Story

Top 5 vCISO Takeaways of 2019

A woman works on a mac computer

As the end of the year rapidly approaches, everyone does their best to reflect upon the prior year (or decade, since it is the end of one of those as well) and see what they might have learned from the past year. What were the top songs, top movies, and top vacation destinations, just …

Read Story

3 Keys to Getting Your Cybersecurity Program Back on Track

new-years-eve-1953253_1920

2020 is finally here, whether we are ready for it or not! With the new year brings new challenges to organizations across all industries. With technologies on the rise and criminals only gaining more and more resources, organizations may struggle to keep up in 2020.

Read Story

Subscribe by email