09 Aug Compliance | Category - Pivot Point Security, Cybersecurity | Category - Pivot Point Security, InfoSec Strategies | Category - Pivot Point Security IoT Devices: The Lord Giveth and He Taketh Away January 16, 2024 By John Verry News flash for those who have been asleep for the last few years—there are a lot of security issues in IoT. When an issue rises to t... Continue reading
19 May InfoSec Strategies | Category - Pivot Point Security 300 Million and One Reasons to Fight Ransomware Across Your Supply Chain January 19, 2024 By John Verry In speaking with a client this week about the Colonial Pipeline Attack I referred back to the Maersk attack as they both illustrate the... Continue reading
18 May ISMS Consulting Why You Should Tell Your ISO 27001 or SOC 2 Auditor That You Want as Many Nonconformities as Possible January 15, 2024 By John Verry Part of my day job is acting as Pivot Point Security’s CISO. In that role, I have participated in our ISO 27001 ISMS Internal Audit and... Continue reading
17 May InfoSec Strategies | Category - Pivot Point Security Do We Need a Virtual CISO? March 16, 2023 By John Verry To a harried CTO who is tasked with dealing with security issues at the expense of his cloud migration efforts, a vCISO to make some of... Continue reading
07 May ISO 27001 Certification | Category - Pivot Point Security 13 Million Reasons to Scope Before Gap Assessment – Pivot January 4, 2024 By John Verry Over the last 20+ years, one of the most frequent questions I’ve answered for clients that need to move to a (more) “provably secure” s... Continue reading