Skip to content
Menu
menu

Close up photo of a typewriting with the phrase "Are you Ready" typed on a piece of paper. There is an light blue overlay with circuit imagery over the image. How to recover after a cybersecurity hack.

Your Cyber Response Plan Needs These 6 Components

Cybersecurity incidents are no longer a matter of if, but when. Building a good strategy and architecture to deter intrusions is incredibly important in reducing the frequency and severity of incidents, but there is no scenario where any organization is totally immune. That means that every organization must have a plan for what they will do in both their enterprise (IT) and operational technology (OT) environments in case an incident occurs.

Read the Article

Related: Uptime at Any Cost: Why Cyberactors Increasingly Targeted Manufacturing in 2021

Recommended: Meet the Latest Players in Industrial Control System Cyber Intrusions

Featured Articles

Close up photo of a typewriting with the phrase "Are you Ready" typed on a piece of paper. There is an light blue overlay with circuit imagery over the image. How to recover after a cybersecurity hack.

Security Technology: Strengthening Your Cybersecurity Posture

In 2021, there were several high-profile incidents of security technology being compromised due to poor cybersecurity hygiene, increasingly aggressive nation-state actors, and a growing attack surface with the adoption of IoT and OT. These trends have only continued in 2022, suggesting a new normal for the threat landscape. The October issue of Security Technology will look at how the security industry is incorporating cybersecurity risk into the technology and systems it relies on.

Security Management Podcast

October 2022: ESG—A Board Priority and a Matter of Life and Death; Plus BEC Scams and Defenses

Security and environmental, social, and governance (ESG) priorities may seem like strange bedfellows, says Lindsay Whyte, but where boardrooms are concerned, security can enable advancement in ESG efforts and ESG can be a matter of life and death—especially in isolated locations with high-value resources. In this episode of SM Highlights, hosted by Chuck Harold, learn more about ESG as a crisis management tool.

Also, learn from Tonia Dudley from Cofense about how business email compromise (BEC) fraud is evolving to take advantage of business processes and routines and what it means for security professionals.

ASIS Calendar of Webinars & Events

As the preeminent organization for security management professionals, ASIS International offers a dynamic calendar of events to advance your professional development. From executive education to global exchanges, our events work together to help you reach new heights in your career.

Book Review: The CISO’s Next Frontier: AI, Post-Quantum Cryptography and Advanced Security Paradigms

The CISO’s Next Frontier: AI, Post-Quantum Cryptography

Featured in the September/October Issue

When it comes to computer security, the times are constantly changing. That is one of the most challenging aspects of security—by the time you finally secure something, numerous new threats have arrived.

Catch Up With SM on Social Media

Be the first to hear about new SM articles, issues, videos, and more on Twitter.
Share the latest SM articles, infographics, and stories with your friends and colleagues.
Get more award-winning security content in your search results by following us on Google News.

Security-Snapshots-Logo.jpg

The guarding industry faced a perfect storm of personnel challenges during the COVID-19 pandemic, and it’s still recovering from the labor shortfall, says Leon Beresford, CPP, PCI, PSP, from the ASIS Security Services Community. So, how can guarding firms and in-house security teams stay competitive and attractive to qualified candidates? It’s time to expand your employee satisfaction and recruitment toolkit.

ASIS members can continue the conversation by joining the Security Services Community here.

Security Management News Feeds

;
record_voice_over

Podcasts

Hear what Security Management editors and guest speakers have to say about this month’s magazine.

cast_for_education

Webinars

View all of our past and upcoming educational webinars.

cloud_download

Download

ASIS Members: Download all the latest editions of Security Managment for your PC, tablet, or mobile device.

arrow_upward