Skip to content

Articles by Heather Buker

Check out Heather's LinkedIn profile here or full biography here.

abstract_blog_circle_lime
Top 6 risk management challenges in 2023

As we enter 2023, it is a good time for legal and compliance professionals to reflect on the past twelve months and consider how they can improve their risk management practices..

Read More

 What you need to know about CMMC 2.0 requirements

In early 2020, the US Department of Defense (DoD) introduced the Cybersecurity Maturity Model Certification (CMMC), which has since gained significant attention. The CMMC program..

Read More

 Achieving CMMC 2.0 Compliance as a DoD Contractor

If your manufacturing business deals with government contractors, you're probably familiar with the Cybersecurity Maturity Model Certification (CMMC). In case you're not, here's a..

Read More

 Cost of a data breach - IBM 2022 Report

Cybersecurity incidents are costly, as we have seen with Medibank and Optus. The average total cost of cybersecurity breaches in the United States in 2022 was estimated to be USD..

Read More

 What is enterprise risk management (ERM)?

Enterprise Risk Management (ERM) is a comprehensive and proactive process that organizations use to identify, assess, prioritize, and manage risks that may affect their ability to..

Read More

How ISO 27001 and NIST CSF complement each other

What is ISO 27001? ISO 27001, also known as ISO/IEC 27001, is an internationally recognized standard for information security management systems (ISMS). It provides a systematic..

Read More

 7 tips for your threat & vulnerability management program

Threat actors are constantly searching for ways to exploit vulnerabilities in networks and software systems. These threats can come from both domestic and global sources and can..

Read More

 4 elements of a robust vulnerability management program

In the wake of major security breaches, companies have been working to implement stronger and more proactive measures for managing vulnerabilities in their systems. However, as..

Read More

 The risk based vulnerability management approach

What is risk based vulnerability management? Risk-based vulnerability management is an approach to identifying, evaluating, and prioritizing vulnerabilities in a system or network..

Read More

 Risk identification: A key step in risk management

Risk identification helps project managers and organizations identify potential risks that may impact the success of a project or the overall business. By identifying these risks,..

Read More

 Understanding cybersecurity risk management

What is cybersecurity risk management? Cybersecurity risk management is a crucial procedure that revolves around recognizing, evaluating, and addressing potential risks to an..

Read More

 A brief overview of ASD Essential Eight

The ASD Essential Eight strategies are used by organisations to improve their cybersecurity posture. Here are some common questions about the cybersecurity framework. What is ASD..

Read More