Skip to content

Articles by Heather Buker

Check out Heather's LinkedIn profile here or full biography here.

abstract_blog_circle_lime
 The role of vendor risk management in cybersecurity

As cyber threats continue to rise, businesses face significant risks from third-party vendors. The World Economic Forum's Global Cybersecurity Outlook 2024 reports that 41% of..

Read More

 Understanding the three main types of security controls

Understanding the three main types of security controls As digitalization continues to transform the modern business landscape, safeguarding sensitive information is critical to..

Read More

 Best practices for an effective cyber security risk management plan

Businesses today are under constant threat from an ever-evolving array of cyberattacks. Cybercriminals are becoming more sophisticated, employing tactics like ransomware attacks,..

Read More

Trending blog

Understanding today's risk management challenges In 2024, the business landscape has been marked by significant challenges, highlighting the critical importance of Enterprise Risk..

Read More

 CMMC 2.0 is here: Key changes and what it means for your business

Last October 15, 2024, the final rule for the latest iteration of the Cybersecurity Maturity Model Certification (CMMC) was published by the US Department of Defense (DoD). With..

Read More

 5 steps for effective risk management

Whether you’re planning a new project or looking to enhance your organization’s security program, implementing risk management is crucial in ensuring that you achieve your..

Read More

 How to create a risk management policy: Key steps and components

Verizon’s 2024 Data Breach Investigations Report reveals an overwhelming 16,843 Denial-of-Service attacks, 5,175 incidents of system intrusion, 3,661 social engineering incidents,..

Read More

 6 steps to build an effective security compliance program

Today, organizations face increasingly advanced threats on top of evolving regulations and significant consequences of non-compliance. Thus, ensuring robust security compliance is..

Read More

 Holistic GRC: Security compliance, risk, & incident management

Keeping your organization secure from diverse threats and disruptions entails a holistic approach to governance, risk, and compliance. Security compliance, risk management, and..

Read More

 Essential IT risk management frameworks

In the dynamic landscape of information technology (IT), businesses face a myriad of risks that can compromise the integrity, confidentiality, and availability of their data and..

Read More

 Building a cybersecurity risk management plan

With today’s organizations navigating complex technology infrastructures, a vast network of third parties, and increasingly stringent laws and regulations, the need to manage..

Read More

 A cyber GRC expert guide for portfolio managers (+ demo & price guide)

Private equity firms face unique challenges when managing cybersecurity, risk, and compliance across their diverse portfolio companies. These challenges increase during mergers..

Read More