make a good business
better
Cancel
Recent
Gaining Comfort Around the Company's Legal Processes
02/11/2019
Security Leadership Series: Don't Be the Only Person Carrying the Mantle for Cybersecurity
02/06/2019
What to Know About the HITRUST RightStart Program
02/04/2019
Digital Forensics—Ransomware History, Rising Risks for Law Firms, and More
01/23/2019
Information Security
Menu
About
People
Services
Industries
Resources
Careers
Locations
Contact Us
Search
About
Overview
LBMC Family of Companies
All Services
Managed Security Services
Compliance & Audit
Security Consulting
BALLAST Risk Assessment Software
All Industries
Healthcare
Retail, Restaurants / Franchises and Hospitality
Other Industries
All Resources
Blog
Events and Podcasts
Guides
Videos
Success Stories
make a good business
better
All LBMC
Companies
LBMC
Staffing Solutions
Technology Solutions
Employment Partners
Investment Advisors
Information Security
Physician Business Solutions
W Squared
Blog
Information Security
Search Resource Center
Close Search
LBMC Company
LBMC
Audit, Tax & Advisory
Staffing Solutions
Technology Solutions
Employment Partners
Investment Advisors
Information Security
Physician Business Solutions
W Squared
Wealth Advisors
Resource Type
Articles
Blogs
Collateral
eAlerts
Events and Podcasts
Newsletters
Newsroom
Success Stories
White Papers
Videos
Recent
Gaining Comfort Around the Company's Legal Processes
02/11/2019
Security Leadership Series: Don't Be the Only Person Carrying the Mantle for Cybersecurity
02/06/2019
What to Know About the HITRUST RightStart Program
02/04/2019
Digital Forensics—Ransomware History, Rising Risks for Law Firms, and More
01/23/2019
Tag:
cybersecurity
X
Gaining Comfort Around the Company's Legal Processes
02/11/2019
| By:
Mark Johnson, CISSP
, Shareholder, Information Security
Just look around. That’s all it takes to notice that today’s technological landscape is wildly different from what it used to be. With an abundance of new devices comes an…
read more >
Posted in:
Security Consulting
,
Compliance and Audit
Tagged with:
cybersecurity laws
,
cybersecurity legal processes
Security Leadership Series: Don't Be the Only Person Carrying the Mantle for Cybersecurity
02/06/2019
| By:
Mark Burnette, CPA, CISSP, CISM, CISA, CRISC, CGEIT, ITIL, QSA
, Shareholder, Practice Leader of Risk Services
It’s easy to feel like a lone wolf when you work in cybersecurity (or a lone wolfpack, if you’re part of a cybersecurity team). While the work you do impacts every area of your…
read more >
Posted in:
Security Consulting
Tagged with:
cybersecurity leadership
Tips on Cybersecurity Vendor Risk Management for the Board of Directors
01/08/2019
| By:
Mark Johnson, CISSP
, Shareholder, Information Security
Think about your vendors. Each one presents a unique risk to you. Whether it’s a risk to information security or the availability of your company’s product or service, all vendor…
read more >
Posted in:
Security Consulting
,
Information Security Solutions
Tagged with:
cybersecurity vendor risk management
,
information security vendors
Security Leadership Series: Don't Say, "No," Say, "Not that Way"
12/10/2018
| By:
Mark Burnette, CPA, CISSP, CISM, CISA, CRISC, CGEIT, ITIL, QSA
, Shareholder, Practice Leader of Risk Services
Security leaders are, by their nature, paranoid. We spend so much time dealing with security issues and seeing our peers dealing with them, that it's natural to want to freak out…
read more >
Posted in:
Security Consulting
Tagged with:
security leadership
,
cybersecurity paranoia
Questions for the Boardroom: Is the Company Fostering a Culture of Compliance and Security?
12/06/2018
| By:
Mark Johnson, CISSP
, Shareholder, Information Security
Here’s a fact: Employees at every organization create, handle, and manipulate sensitive data daily. It’s their job. And, that means employees are the first line of defense for…
read more >
Posted in:
Compliance and Audit
,
Security Consulting
Tagged with:
boards and cybersecurity
,
culture of compliance
Security Leadership Series: Overcoming the Curse of Knowledge
11/19/2018
| By:
Mark Burnette, CPA, CISSP, CISM, CISA, CRISC, CGEIT, ITIL, QSA
, Shareholder, Practice Leader of Risk Services
Making cybersecurity a topic of conversation with C-level leaders is one of the most important goals for cybersecurity professionals. Ultimately, those are the people who are…
read more >
Posted in:
Security Consulting
Tagged with:
cybersecurity leadership
,
curse of knowledge
How Dressing Like Batman Can Help You Be Better at Cybersecurity
11/06/2018
| By:
Mark Burnette, CPA, CISSP, CISM, CISA, CRISC, CGEIT, ITIL, QSA
, Shareholder, Practice Leader of Risk Services
A few years ago, on the day after Halloween, my wife bought a Batman costume off the clearance rack. It was heavily discounted, and she figured I might be able to use it for a…
read more >
Posted in:
Security Consulting
Tagged with:
cybersecurity
,
cybersecurity leadership
Boards and Cybersecurity: Does Your Company Have a Comprehensive Cybersecurity Program?
11/05/2018
| By:
Mark Johnson, CISSP
, Shareholder, Information Security
There are no one-size-fits-all cybersecurity programs. I wish I could tell you to “Do this. Do that. Don’t do these other things.” But, that’s not reality. Just like a tailored…
read more >
Posted in:
Security Consulting
,
Compliance and Audit
Tagged with:
boards and cybersecurity
Security Leadership Series: Be a Code Talker, Not Chicken Little
10/22/2018
| By:
Mark Burnette, CPA, CISSP, CISM, CISA, CRISC, CGEIT, ITIL, QSA
, Shareholder, Practice Leader of Risk Services
If you’re not familiar with the popular children’s fable Chicken Little, it’s the tale of a chicken who walks around proclaiming, “The sky is falling!” because he believes…
read more >
Posted in:
Security Consulting
Tagged with:
cybersecurity warnings
,
cybersecurity leadership
,
cybersecurity communication
Security Leadership Series: An Important Principle for Every Cybersecurity Leader to Remember
09/20/2018
| By:
Mark Burnette, CPA, CISSP, CISM, CISA, CRISC, CGEIT, ITIL, QSA
, Shareholder, Practice Leader of Risk Services
Here’s a principle every cybersecurity leader needs to acknowledge: Cybersecurity is not the single most important element of your company’s business. In reality, most businesses…
read more >
Posted in:
Security Consulting
Tagged with:
information security leadership
,
cybersecurity
Older Posts >
What's New
Blog
Events and Podcasts
Guides
Videos
Success Stories
Filter by Category
Compliance and Audit
Healthcare
Information Security Solutions
Managed Security Services
PCI Compliance
Security Consulting
About this Blog
Your resource for up-to-date information security trends and developments from our team of experts.