Platform – Entities Page

In this series of posts from our CEO and co-founder, Ted Gutierrez, he talks about our platform’s Entities Page. Why it exists, what our customers use it for, and how it helps them make risk management improvements faster. Enjoy.     So You’ve Completed an Assessment….What Now? When I was a risk manager working for […]

Plan Your Remediation Budget

make sure to allocate enough dollars to cover remediations your team might need

Start with remediations first The most challenging part of remediations is finding the resources. Whether people, budget, or time, risk stakeholder teams are generally overworked and remediation activities tend to take second chair for newly organized or exhausted teams. One way to ensure that resources are available post-assessment is to ask for them before the […]

How to Pre-Plan Assessment Remediations

preplanning your remediations

Make your assessments meaningful by pre-planning remediations Upon first glance, this may seem backward. Remediations come after the assessment where you discover what needs to be remediated, right? Yes, but if you’ve been involved with risk management for a few cycles of assessment and “reassessment” activities, you’re likely familiar with a common theme: Most post-assessment […]

How to Align Stakeholders on Your Cybersecurity Strategy

align stakeholders

Overview We see that companies of all sizes often lack a strategy to gain buy-in from their stakeholders and thus fail to align on the purpose of assessments. Cyber risk assessments are a vital cornerstone of any risk management strategy. To make sure your organization is getting the maximum value of time and resources invested in these […]

10 Steps for a Successful Assessment Strategy

industrial facility

The key to successful assessment planning begins with clear communication throughout the initial planning phases. To ensure technical and non-technical leaders are aligned on the purpose of the cyber assessment, use the 10 steps below to facilitate communication prior to beginning the assessment. (Note: many of these steps can be done simultaneously.) – Why We Started

In 2015 Russian operatives started a phishing process that hacked the U.S. presidential election. Continuing throughout the following year, leading up to the election, the hackers repeatedly stole data from Democratic National Committee servers and used it to influence voter behavior. Congress responded by passing the Cybersecurity Information Sharing Act and President Obama directed his […]

Review of the Critical Infrastructure Maturity Model

The success and efficiency of any cybersecurity program depend primarily on how far people can see the difference between what situation they are in and what situation they think they are in. The Critical Infrastructure Maturity Model (CIMM) touches upon this critical issue.

Houston’s Veteran Business Support Network was honored to participate in yesterday’s Veterans Day Pitch Event hosted by 1836. This event brought together a cross-section of leaders in Houston’s entrepreneurial community, venture capital, private equity, and industry sectors. This event both honors Veterans Day and provides support for veteran-owned start-up businesses.

About Us

Contact Us