Blog
Updates on what's trending in Cybersecurity5 Effective Vendor Due Diligence Best Practices
Customer due diligence is critical for any business transaction, having a vendor due diligence process before agreeing to work with a new vendor is crucial for business success. While forming vendor due diligence checklists, businesses typically contract with a third...
read moreVendor Risk Management Best Practices
It is vital to protect a company's integrity and security by identifying and minimizing the risks posed by third-party providers via vendor risk management. What Are the Best Vendors Risk Management Practices? The interdependent web of contacts that connects companies...
read moreThird-Party Risk Management Framework
What Is Third-Party Risk Management? Third-party risk management is sorely needed in many industries. In essence, third party risk management is something that a company does to identify and manage risks to their organization that comes from outside third parties,...
read moreThird-Party Data Breaches: The Intrusion You Cannot Afford
Protecting the privacy and integrity of the data you manage and transmit is one of your company’s prime responsibilities. Start by understanding data breaches. What is a Third-Party Data Breach? Cyber attacks that result from the criminal actions of an outside entity...
read moreiTrust featured in SC Magazine’s March 2019 Issue
Atlanta, GA - March 4, 2019 – iTrust shared today that SC Magazine, a leading provider of industry expert guidance and insight has featured iTrust in its March 2019 issue. The magazine included iTrust as part of their review of the most popular Vendor Risk Management...
read moreiTrust Recognized Again for it’s Outstanding Vendor Risk Platform
Atlanta, GA - February 15, 2019 – iTrust announced today that Info Security Products Guide, the industry's leading information security research and advisory guide, has named iTrust, a winner in the 15th Annual 2019 Info Security PG’s Global Excellence Awards® for...
read moreiTrust Trending
Register for iTrust’s bi-Weekly cybersecurity newsletter
Webinars
Valuable information on IT security and complianceCyber Supply-Chain Attacks
Should we be Afraid of our Third Party Vendors? The biggest threat in cybersecurity might be under our noses. According to a recent Ponemon Institute study, US organizations are failing to assess the risk of attacks and data breaches from vendors in their...
read moreUnwrapping the EU’s General Data Protection Regulation
The EU General Data Protection Regulation (GDPR) is designed to harmonize data privacy laws across Europe, to protect and empower EU citizens, and to reshape the way organizations approach data privacy. As the deadline for GDPR compliance approaches, companies across...
read moreTackling the Top Cybersecurity Threats of 2018
Industry experts predict the unpredictable and share ideas on threat mitigation 2017 was a terrible year for security managers. Vulnerabilities and exploits blew up, malware infections accelerated, and data breach costs reached well into the billions. So what's in...
read moreYou Just Got Pwned – New Threats to Mobile Security
Mobile devices are now more ubiquitous than PCs. Their popularity and relatively immature security have made them attractive targets for hackers. The number of new vulnerabilities in mobile operating systems and apps continues to grow; as does the number and...
read moreRisks and Rewards – Securing the Internet of Things
IoT is transforming industries and creating massive business opportunities. By 2020, the number of IoT connected devices is predicted to exceed 40 billion. From smart televisions to critical infrastructure, our industry needs to protect and manage devices and...
read moreHacking the Human – How Social Engineering Owns Our Users
Highly targeted Social Engineering attacks are wreaking havoc in cybersecurity. In one recent incident, hackers used Social Engineering to defraud a US company out of nearly $100 million. The increased use of these techniques is directly related to the fact that they...
read moreIncident Response – Anatomy of a Cybersecurity Breach
Ever wonder what it's really like to be inside a cybersecurity breach? The increasing number of high-profile compromises are a valuable warning for cybersecurity professionals. A real-life incident shouldn't be your first. Join our panel of cybersecurity experts as we...
read moreRSA Conference 2016 – Seven Key Takeaways You Can Use Today
RSA Conference 2016 broke new ground as the largest gathering of security professionals with +40,000 attendees, +500 exhibitors, and +213,000 square feet of exhibit space. While keynotes, and many speakers addressed global and national issues, these topics often have...
read moreSmackdown: Wrestling with Security and Compliance in the Cloud
Rapidly evolving cloud technologies makes evaluating security and compliance risks a difficult proposition. Cloud service providers and their clients have a shared responsibility for security and compliance; but defining these roles can keep you running in circles. In...
read moreHow to Survive the Top Ten Cybersecurity Risks of 2016
2016 looks like another challenging year for cybersecurity. Security threats are multiplying all over the globe and threaten to disrupt businesses, government, and individuals. Join our panel of cybersecurity experts as we discuss predictions for the Top 10...
read morePayment Card Industry Security and Compliance Round Table
Join InfraGard Atlanta and our panel of experts discussing the latest PCI trends and challenges. Our panel includes representatives from Northwestern University, Comodo, and TrustNet. Three organizations, with three very different perspectives. We'll dive into a...
read moreYou’ve been hacked. Now it’s time for “Plan B”
With global Cybercrime costs soaring to $445 billion a year, Cyber Insurance is one of the hottest trends in risk mitigation. Join industry experts from TrustNet and Cyber Data Risk Managers LLC for a dynamic and interactive discussion about Cyber Insurance. Whether...
read moreHow the Retail Industry is Shaping the Future of Cybersecurity
An estimated two-thirds of the U.S. gross domestic product comes from the retail industry. This activity has also driven the mass accumulation of payment card data that now serves as a de facto currency. The unfortunate consequence is that criminals can be more...
read moreConquering our Biggest Security Challenges in 2015
This webinar features industry cybersecurity experts discussing how they are addressing their biggest security challenges and what's keeping them up at night. We'll get practical advice on how they use tools, technologies, and processes to protect their enterprises....
read moreWhitepapers
In-Depth knowledge and reports on cybersecurity's most common questionsFive Tips to Consider when Developing a Security Awareness Training Program
How to set up your security awareness training program to better protect your company
read moreEight Tips for Success in Becoming PCI Compliant
The PCI DSS requirements embody many security best practices
read moreFive Reasons to Embrace a MSSP
Today’s rapidly evolving technology landscape demands responsive security
read moreSix Reasons Why a Periodic Penetration Test is Essential
A Penetration Test is vital in assessing a company’s cybersecurity environment
read moreWhat is a SOC Report?
The Essentials of Service Organization Control Reports
read more