This month, we announced an exciting new addition to our Bay Dynamics’ Board of Directors – Ret. Brig. Gen. Gregory Touhill. You may recall reading the many headlines and commentary about Gen. Touhill. He was the United States’ first federal CISO, appointed by President Obama, and currently is president at Cyxtera Technologies, leading its new […]
It seems that the General Data Protection Regulation is everywhere – in the headlines, leading conference discussions, in the boardroom, etc. etc. etc. Coalitions (i.e. GDPR Coalition), summits (i.e. GDPR:Summit), even a news publication (i.e. GDPR:Report) have been created to help organizations comply. And, the regulation doesn’t even take effect until May 2018. But don’t let that […]
You may recall our two recently released reports – Reporting to the Board: Where CISOs and The Board are Missing the Mark and How Boards of Directors Really Feel About Cyber Security Reports. They stemmed from two surveys distributed by the third party research firm, Osterman Research, asking security executives and boards of directors […]
September marks the ten-year anniversary of the Payment Card Industry Security Standards Council (PCI SSC), a group created by the major card brands to strengthen the protection of payment card data.
Today we unveiled a new version of our Bay Dynamics flagship cyber risk analytics platform, Risk Fabric®. We implemented the enhancements to help IT and security practitioners ease some of their greatest pains.
Bay Dynamics is headed back to Black Hat August 1-4 where the best in security – from hackers to C-level executives - gather in the heat of the Vegas desert to discuss the hottest security issues. In the 19 years since Black Hat began, a lot has changed in the industry.
Our Bay Dynamics co-founder and CEO Feris Rifai recently spoke at the 2016 SINET Innovation Summit about this communication gap and how CISOs can shift their approach so that they think and speak risk.
Security and risk organizations place a lot of focus on vulnerabilities, and rightly so. These nasty flaws in systems and applications – if leveraged by miscreants – can result in millions of dollars in losses, in addition to significant reputational damage. Enterprises, both large and small, all have vulnerability management programs. However, there are significant […]
Check out our new “intergraphic” – an interactive graphic - that takes you inside the cockpit of a CISO.
The people within an organization that are closest to the crown jewels have to take an active role in guarding that information in the digital world, the same way they would in the physical world.