Towerwall's InfoSec Blog

Content Type

See all

Passing The Cybersecurity Baton To A vCISO

GDPR , GRC , Compliance , cannabis , vCISO , Enterprise

Michelle Drolet

Businesses continue to face modern cyber attacks such as ransomware threats and data breach incidents. In the wake of a non-stop onslaught from advanced hackers, it seems that no matter what defensive measures organizations put in place, cyber adversaries and malware authors are able to circumvent them.

The GDPR is a Journey, Not a Destination

Data Protection Officer , CCPA , GDPR , PCI , General Data Protection Regulation (GDPR) , European General Data Protection Regulation (GDPR) , HIPAA , Pseudonymization , Compliance & Privacy , Subject Access Request (SAR) , cannabis , vCISO , Enterprise

Michelle Drolet

Make sure you understand the need to operationalize data management and security. There has been a widespread rush to get organized and compliant in time for the May 25 deadline when the EU data privacy law General Data Protection Regulation comes into effect. Little wonder when you consider what non-compliance with the GDPR could cost you -- fines of up to 20 million euros (around $23.7 million) or 4% of the total worldwide annual turnover of the preceding financial year, whichever isfalse

10 Things I Know About… Cybersecurity trends

Virtual CISO , Worcester Business Journal , Phishing , Data breaches , PCI , malware , ransomware , cybersecurity trends , 10 Things I Know , IoT , cannabis , cybersecurity , vCISO , Enterprise

Michelle Drolet

10) Data breaches. Nearly 5 million data records are lost or stolen worldwide every single day, or 58 records every second. According to an IBM report, the average cost of a data breach is $7.3 million.

Application security is maturing, but independent testing is crucial

Open Web Application Security Project (OWASP) , appsec , Application Security , independent testing , OWASP , cannabis , vCISO , Enterprise

Michelle Drolet

Skills shortage is making shift to continuous appsec testing challenging. While application security (appsec) is firmly on the radar, most organizations still have a way to go before they can be confident about how secure their apps are. Devops is accelerating the speed of development and, coupled with the shift to the cloud, it’s creating many challenges for appsec. Breaking down walls between security, development and business units is easier said than done and the security skills shortagefalse

Listen to a recording of our recent webinar: "Do You Know Your Risk Tolerance – The Role of a vCISO."

Webinar , Michelle Drolet , Fractional Chief Information Security Officer (CIS , cannabis , vCISO , Enterprise

Michelle Drolet

Happy National Cyber Security Awareness Month! Kick off October with our recent Lunch with a vCISO webinar"Do You Know Your Risk Tolerance – The Role of a vCISO."

Build it right with NIST’s Cybersecurity Framework

NIST , Cybersecurity Framework , Compliance & Privacy , Compliance , Special Publication 800-53 , cannabis , vCISO , Enterprise

Michelle Drolet

Diving into NIST Special Publication 800-53 for practical advice. We’ve already laid out a broad overview of what NIST’s cybersecurity framework can do for you, so today we’re going to drill into Special Publication 800-53. Published by the National Institute of Standards and Technology, and based on important research from the Information Technology Laboratory, this publication offers a comprehensive set of security controls to help you protect your data. The document refers to Federalfalse

Michelle Drolet interviewed on "Today's security challenges" in recent TechTarget E-Handbook

TechTarget , Data Security , Fractional Chief Information Security Officer (CIS , Channel Partners , cannabis , vCISO , Enterprise

Michelle Drolet

Channel partners can make arguments for the integrated security suite and the best-in-class point product method, but the decision ultimately rests on a customer's specific needs.

5 Cybersecurity Trends to Watch for 2017

5 Cybersecurity Trends to Watch for 2017

Fractional Chief Information Security Officer (CIS , CISO , Phishing , Application Security , ransomware , Internet of Things , IT departments , third-party partners , DDoS attacks , cannabis , cybersecurity , trends , vCISO , Enterprise

Michelle Drolet

Fresh and familiar threats to concern IT departments. As we embark on 2017, it's time to reflect on a year where cybersecurity has played a major role. Even presidential campaigns haven’t been free from hacking scandals and data leaks. The average cost of a data breach for companies grew from $3.8 million last year to $4 million in 2016, according to the Ponemon Institute. Companies of all sizes have embraced the cloud and open source has become the standard for infrastructure software. Bothfalse

Hired guns: The rise of the virtual CISO

Virtual CISO , Information Systems Security Association , Fractional Chief Information Security Officer (CIS , CISO , PCI , HIPAA , Compliance , cannabis , vCISO , Enterprise

Michelle Drolet

When is the right time to rent yourself a CISO? The enterprise is facing a dangerous combination of mounting cybersecurity threats of increasing subtlety—and a widening gap in the skills required to identify and combat them. Having someone who knows how to lead the charge in identifying and analyzing threats, creating strategic security plans and ensuring compliance requires the right level of expertise.

10 Things I Know About...Hiring a vCISO

breach , Virtual CISO , Fractional Chief Information Security Officer (CIS , Compliance & Privacy , 10 Things I Know , Compliance , cannabis , vCISO , Enterprise , small and midsize businesses

Michelle Drolet

10. A hedge against a breach A virtual chief information security officer can serve as security consul or as an interim CISO to fill the gaps during a planned information-technology security policy review. Better to be safe than sorry.