The Cybersecurity and Infrastructure Security Agency on Tuesday published a second version of its Zero Trust Maturity Model, which updates implementation guidance for agencies across key pillars ...
With a goal of strengthening the overall security posture of the Defense Industrial Base, the U.S. Defense Department in January 2020 released the inaugural version of its Cybersecurity Maturity Model ...
“Data is the new oil” being cliche only highlights the statement’s relevance. As data volumes continue to multiply, so do the complexities of management — especially in cybersecurity. Cribl Inc. is ...
About three years ago, Steven Adler was running the privacy consulting practice at IBM. As he talked with IBM customers, he discovered that many of the large customers had some pretty complex IT ...
Staying ahead of the competition is a constant refrain law firms hear, but how do they know if they are in front of the curve or falling behind when it comes to data maturity? This session will ...
As the great management expert W. Edwards Deming once said, “Without data, you’re just another person with an opinion.” Obviously, data is all the rage today; it’s what makes the flashiest technology ...
The Cybersecurity and Infrastructure Security Agency will publish the second version of its Zero Trust Maturity Model in the coming days, a top agency official said Thursday. The latest version of the ...
The term “security culture” is often combined with security awareness and training, but there’s more to it. Unlike basic awareness programs focused on knowledge dissemination, security culture ...
Data fuels a customer retention program. Customer data collected from various touchpoints is key to deciphering customer behavior and implementing effective retention strategies by improving customer ...
The Consortium for State and Regional Interoperability, a collection of the nation’s largest nonprofit health data organizations, released the CSRI Health Data Utility Maturity Model last week at the ...