Top Five Recommendations

As someone with deep experience in advising companies on how best to de-risk the enterprise, I wanted to find out what advice he would offer to boards and to management teams. For instance, he notes that his top five recommendations for boards … Continued

5 questions to ask your CEO about cybersecurity

Businesses will continue to face a ton of cyber threats, some of which will impact organizations severely enough to require security measures that will reach far beyond compliance. A Ponemon Institute study showed that the average compromised record cost approximately … Continued


Buckley, who succeeds Bill McNabb as CEO on Jan. 1, was asked at the 2nd-annual Evidence-Based Investing conference what keeps him up at night. “Cyber,” he replied at Thursday’s conference in New York. “It is front of mind all the … Continued

ISA-95 Is Necessary for Smart Manufacturing

An information model used to define the interface between control functions and other enterprise functions, ISA-95 does not become dated over time the way technology would. It provides a smarter way to push ahead. What impact will the Industrial Internet … Continued

Cybersecurity for Control Systems in Process Automation

Attacks to your production system may happen at any time and at any level – from outside as well as from inside. Which concepts and measures exist to protect your assets efficiently from software attacks? The ISA99 standards development committee … Continued

European Cybersecurity Challenge 2017

From 31 October to 3 November 2017, ENISA will support the most important European cyber-competition of the year, the European Cyber Security Challenge (ECSC). Published on October 10, 2017 Organised and hosted by the Spanish National Cybersecurity Institute INCIBE in … Continued

National Cyber Security Awareness Month

National Cyber Security Awareness Month (NCSAM) is in full swing. The month and its events have become top of mind for people and businesses in recent years, given the staggering number of recent data breaches and global ransomware attacks. The … Continued