1-888-PIVOT-POINT | 1-888-748-6876 info@pivotpointsecurity.com
Talk with an Expert »
Select Page
Access Here >> The Recipe & Ingredients for ISO 27001 Certification

Sitemap

Even The Greatest Jeopardy Contestants of All Time Struggle with Cybersecurity

If anyone out there is like me, you have enjoyed James Holzhauer, Ken Jennings and (a little of) Brad Rutter go toe to toe in the, “The Greatest of All Time” Jeopardy showdown over the last three nights. These guys are nothing short of amazing. They recall information...

ISO 27701 and ISO 27001—Better Together

We’re seeing a big uptick in interest in the newly published ISO 27701 data privacy extension to ISO 27001—especially among organizations that are considering ISO 27001 certification (or area already ISO 27001 certified). That makes sense given the high percentage of...

Why Business Impact Analysis and Recovery Planning Should Be Facility-Specific

Recently one of our legal clients asked for a business impact analysis (BIA). The BIA was to cover all of its other offices in the U.S. and abroad…  But we would interview only the personnel at the headquarters office. In other words, the functional recovery plan...

General Counsels are Taking the Lead in Privacy Compliance

Recently we created a California Consumer Privacy Act (CCPA) compliance roadmap and made it available as a free download (here). We figured quite a few people would be gathering information about this new regulation and take advantage of some free guidance. But what...

OpenTable possibly Opening Issues for Restaurant Security

As an information security and privacy firm, we talk to a lot of people in businesses like financial services, healthcare, legal, municipalities, Software-as-a-Service… because their cyber security and privacy risks are large and obvious. But a recent series of...

Think of Your vCISO as Your Security Blanket

I’m a big fan of Charles M. Schulz’s Peanuts comic strips. Recently I came across an excellent fan wiki devoted exclusively to Linus’ security blanket, including all the many different ways that the blanket was reconfigured and put to use. [perfectpullquote...

Real Life “Sneakers” Report: I’m Looking at the Back of an ATM Machine

So the other day I managed to sneak into a bank’s ATM service room. I was left alone in there, looking wide-eyed at the back of the ATM machine. I could’ve downloaded some malware, installed surveillance cameras to capture credentials … I don’t think I was being...

3 Top Reasons Why You Can’t Wait Any Longer to Start Managing Vendor Risk

Managing vendor risk effectively can demand significant planning and resources. Many small to medium sized businesses (SMBs) lack the expertise and employee bandwidth to tackle the problem in-house, so they’ve put off addressing it. [perfectpullquote align="right"...

You Don’t Really Need the Avengers to Protect Your Data (Sometimes It Just Feels that Way…)

When it comes to information security, sometimes if feels like you need the equivalent of The Avengers on your side: Captain America (or Iron Man, take your pick) as CISO, Thor for incident response, maybe Nick Fury as the data protection officer for CCPA compliance,...

How to Know When You’re Ready for a Fractional CISO

Many business’s need information security expertise and direction—but can’t justify the high cost of a full-time expert like a Chief Information Security Officer (CISO). A fractional CISO (also called a virtual CISO, vCISO or “CISO-as-a-Service”) can cover any or all...