NIST CSF Assessment Tool
What is the NIST-CSF Framework? With more and more critical infrastructure moving online, in 2013 the White House recognized the need to establish a framework to help businesses improve their cybersecurity. The National Institutes of Standards and Technology (NIST) crafted a Cybersecurity Framework (CSF) to help businesses protect online infrastructure critical to the American public. The administration worked with […]
NIST 800-53 Assessment Tool
Looking for a NIST 800-53 assessment tool? Download our white paper at the bottom to learn more about how to make your cyber assessment faster and easier. The foundational security and privacy guidance document of the National Institute of Standards and Technology (NIST) is known as NIST 800-53, the Security and Privacy Controls for Information […]
How Successful Cybersecurity Consultants Drive Higher Client Satisfaction
As an ex-assessor turned product company CEO, I believe great inventions spring from the minds of people hardened through their own struggles and challenges in a unique arena of expertise. For the team at SecurityGate.io, we’re a Software as a Service (SaaS) company, but if you ask our clients what we do they’ll likely say we’re […]
Colonial Pipeline Cyber Attack – Help With Cyber Assessment And Next Steps
On Friday Colonial Pipeline, a major U.S. fuel pipeline operator, was brought down by a ransomware cyber attack. Details are still coming in as the situation develops. We recognize how difficult this time is for the teams at Colonial Pipeline and all the vendors and suppliers that work with them. Our hearts go out for […]
Helping Cybersecurity Consultants With A Major Problem – Losing Revenue With Every Client
Hi, I’m Matt Wilbanks and I’m chief marketing officer at SecurityGate.io. It’s been just over a year since I joined the team and I’ve listened in on countless conversations with risk management teams and the cybersecurity consultants that work with them. I’ve noticed something troubling with the consulting firms that may be old news in the […]
10 OT Security Vendors You Should Know
Check out our updated list of the top OT security vendors you should know in 2024. While operational technology (OT) has traditionally been separate from information technology (IT), that line is increasingly becoming blurred, resulting in new security challenges for organizations. Thankfully, there are now a number of OT security vendors who can help you […]
The Most Overlooked Areas for Risk – Measure Cyber Risk Across People and Processes
Cybersecurity industry veterans Dave Bang and Mick Vaughan sat down to help us answer some major questions about why organizations often overlook the people component of risk, even though it’s the most critical area.
Plan Your Remediation Budget
Start with remediations first The most challenging part of remediations is finding the resources. Whether people, budget, or time, risk stakeholder teams are generally overworked and remediation activities tend to take second chair for newly organized or exhausted teams. One way to ensure that resources are available post-assessment is to ask for them before the […]
How to Pre-Plan Assessment Remediations
Make your assessments meaningful by pre-planning remediations Upon first glance, this may seem backward. Remediations come after the assessment where you discover what needs to be remediated, right? Yes, but if you’ve been involved with risk management for a few cycles of assessment and “reassessment” activities, you’re likely familiar with a common theme: Most post-assessment […]
Align Stakeholders on Your Cybersecurity Strategy
Overview We see that companies of all sizes often lack a strategy to gain buy-in from their stakeholders and thus fail to align on the purpose of assessments. Cyber risk assessments are a vital cornerstone of any risk management strategy. To make sure your organization is getting the maximum value of time and resources invested in these […]