Thought Leadership

Herjavec Group Cybersecurity Cast: Cybersecurity Conversations For The C-Suite in 2018

Herjavec Group Cybersecurity Cast: Cybersecurity Conversations For The C-Suite in 2018

Herjavec Group has launched its very own podcast, The Cybersecurity Cast! Produced by Herjavec Group, The Cybersecurity Cast features discussions on the latest news, trends, vulnerabilities, and exploits in the cybersecurity space. Topics include healthcare, ransomware, identity and access management, and more. Episode 6: Cybersecurity Conversations For The C-Suite in 2018 We recently published the 2018 Cybersecurity Conversation For The... Read More
February 12, 2018
Long Live SIEM !

Long Live SIEM !

Back in 2014, I remember having a conversation with the CEO of well known security technology provider about SIEM (Security Information and Event Management). Back then, there were only a handful of SIEM players in the market. He thought SIEM was dead technology but I wasn’t convinced. I thought the SIEM market would continue to grow, driven not only by... Read More
February 8, 2018
ITWC: Overcoming the People Problem in Cybersecurity

ITWC: Overcoming the People Problem in Cybersecurity

According to Gartner Inc., worldwide spending in information security — a subset of the broader cybersecurity market — will reach $93 billion in 2018. Another leading researcher and publisher predicts global spending on cybersecurity products and services will exceed $1 trillion cumulatively from 2017 to 2021. Naturally, demand for IT security professionals is sharply increasing. In 2015, Symantec predicted that demand would exceed... Read More
February 2, 2018
10 Tips For Building Your Cyber Resilience

10 Tips For Building Your Cyber Resilience

We live in a time of constant cyber threat, and one thing remains certain: cyber criminals are not slowing down. Organizations that can return to regular business operations quickly following a cyber attack will have a significant advantage over those that are unprepared. Unfortunately, according to the 2016 Ponemon Institute study, only 32% of IT and security professionals believed their... Read More
January 18, 2018
ITWC: How to achieve security compliance in the face of cyber threats

ITWC: How to achieve security compliance in the face of cyber threats

It was a great year for deceit in 2017 as hackers launched multiple successful attacks against corporations, organizations, governments, and individuals on an unprecedented global scale. The media cyber security darling — or demon — was the WannaCry crypto-worm, which held hostage the files of thousands of Windows users around the world until a Bitcoin ransom was paid. In all, WannaCry took... Read More
Cybersecurity CEO: When Your Company Gets Hacked, Will You Be Prepared?

Cybersecurity CEO: When Your Company Gets Hacked, Will You Be Prepared?

New report indicates cyber complacency is a growing problem in corporate boardrooms globally Los Angeles, Calif. – Jan. 16, 2017 “Every company will be hacked”, according to Roger Grimes, in a recent story he wrote for CSO. It’s a scary statement to make but Grimes, a 30-year tech industry road warrior who spent the past 11 years as Principal Security Architect at... Read More
January 16, 2018
‘Evolving’ PCI DSS 3.2 Requirements Become MANDATORY on February 1, 2018

‘Evolving’ PCI DSS 3.2 Requirements Become MANDATORY on February 1, 2018

Herjavec Group Contributors: David Mundhenk and Alex Spanovic, Security Consulting Services The current PCI DSS 3.2 requirements were previously considered best practices but are set to become operational in February. For example, multi-factor authentication becomes mandatory as of February 1, 2018. Companies must adhere to these compliance requirements, especially where payments are concerned.  Review the full PCI DSS 3.2 update... Read More
January 10, 2018
NEW REPORT: Cybersecurity Conversations For The C-Suite in 2018

NEW REPORT: Cybersecurity Conversations For The C-Suite in 2018

In 2018, get back to basics.  As we become accustomed to cyber attacks compromising enterprise environments and flashy breach headlines splashed across the news, we risk becoming complacent towards the enterprise need for a proactive cyber defense. It’s time we double down on compliance, cyber hygiene, and the elements of a proactive defense strategy in order to combat advanced cyber threats.... Read More
January 8, 2018
Preparing for a Security Incident: Building an Incident Response Plan

Preparing for a Security Incident: Building an Incident Response Plan

In the cybersecurity realm, a cyber incident is inevitable. In 2017, there were a number of high-profile security breaches and confidential customer data being leaked on the Dark Web. We have to ask ourselves...what can we do to protect our organizations? In his book, Scouting for Boys, Robert Baden-Powell, the founder of the Boy Scouts, wrote: “Be Prepared … by... Read More
January 2, 2018

The 2017 Identity and Access Management Report

Cybersecurity Ventures predicts that organizations globally will spend more than $16 billion annually on IAM products and services by 2022. The Identity and Access Management (IAM) industry is facing many challenges as businesses understand the need for increased digital identity security. Many high-profile breaches in the past three years have occurred as a result of weak IAM practices. This annual... Read More
December 7, 2017