Made with FlowPaper - Flipbook Maker
Darren Guccione, Co-Founder & CEO Craig Lurey Co-Founder & CTO Cybersecurity Edition Sept 2021 WHERE CYBERSECURITY STARTSCopyright @2021 GRC Outlook. All Rights Reserved. The content and images used in the publication should not be reproduced or transmitted in any form or by any means without the prior permission of Grc Outlook. Landon Noah Emily Ava Visualizers editor@grcoutlook.com Sophia Loren Joe TylerAnthony John Editorial staffs Natasha Jacob Managing Editor Copyright @ GRC Outlook 2021 Risks evolve. So should the security stance. But this is partly a telltale euphuism. Because it's only incidents that keep mounting, security is still an afterthought in an executive's mind. Regardless of how much they keep swinging for the fences, everything falls short in times of an event. Shockingly, researchers claim that 87% of C-Suite, board members are dubious about their cybersecurity capabilities. By 2021, cybercrime damages could cost the world a hefty $6 trillion annually. It's scary to the enterprise business world that's inherently susceptible to attacks and breaches and obscure attack vectors the most. The governance, risk, and compliance (GRC) framework makes way for smoother avenues of cybersecurity capacity within an organization. GRC and cybersecurity risk can go hand in hand - this way, companies can even evangelize information easily across these three disciplines. With compliance standards tightening up, it increases the aptitude for risk monitoring, mitigation, management accordingly. A risk management program operating within the GRC framework can address real-time requirements. It monitors dynamic changes, analyzes data, and makes mitigation decisions while priorities and timing change. This edition aims to highlight the innovators that are ahead in their games. Companies that redefined the control layers of security for GRC and revolutionized the management of threat, access, and identity. Whether you're still trying to convince for approving robust security measures; or dubious about the outcomes - these stories are up to your ante. Companies can take home pointers from out-of-the-box thinking, hard-hitting solutions, and strictly no analysis-paralysis. Here we present you the Top 10 Cybersecurity Companies in GRC who're rewriting the playbook of effective defense: Cybersecurity giving new life to GRC Natasha Jacob Managing Editor Sam Morris Sales sam@grcoutlook.com sales@grcoutlook.com EDITOR'S LetterContext Changes Everything. DYNAMIC AUTHORIZATION With Cloudentity’s context-aware Dynamic Authorization, access to applications, data or even personal information (PII) is granted or denied in real-time for each transaction according to the policy and context of the Five Ws (who, what, when, where, and why). The Cloudentity platform does this at hyper- scale and incredible speed. Role or list-based digital security no longer cuts it in the modern world. The result? Better security with an experience customers rave about. To experience context-aware security you can trust, get a demo at Cloudentity.comCOVER STORY Page No 08 WHERE CYBERSECURITY STARTS Developing Airtight Identity Verification Solving Modern Cybersecurity Challenges AUTHENTICID RIVERBED Blair Cohen, Founder Daniel Smoot, President and CEO 16 32 Darren Guccione, Co-Founder & CEO Craig Lurey Co-Founder & CTO44 30 40 36 3 RD PARTY RISK MANAGEMENT STRATEGIES WITH BEHAVIORAL EMAIL THREAT DETECTION CYBER CULTURE EATS CYBER STRATEGY FOR BREAKFAST MANAGING SOFTWARE RISK IN THE DEVOPS ERA WHAT’S YOUR STRATEGY? WILL QUANTUM COMPUTING REALLY AFFECT A COMPANY’S SECURITY POSTURE? Brad Beutlich, Vice President Sales Western Region and LATA at Entrust Jacqueline Jayne Security Awareness Advocate at KnowBe4 Cindy Blake, Senior Product Marketing Manager, Security Specialist at GitLab 22 THE COMMONALITIES OF CYBER- RISK BETWEEN SMB, STATE/LOCAL GOVERNMENT, AND THE ORGANIZATIONS THAT SUPPORT THEM Lawrence Cruciana, CISM, CISSP at Corporate Information Technologies Kristy Westphal Director, Information Security and Operation at HealthEquity Dan Nickolaisen Senior Sales Engineer at Abnormal Security Building an Improved Face of Cybersecurity In to the Depths of Cyber Security Taking Out the Complexity of Compliance CIMCOR SKYBOX SECURITY DIGITAL EDGE Robert Johnson III, President & CEO, Cimcor Gidi Cohen, CEO Michael Petrov, Founder, CEO 20 38 28 CONTENT PAGE 26 CMMC: SUPPLY CHAIN CYBER DEFENSE Uday Ali Pabrai MSEE, CISSP (ISSAP, ISSMP), CMMC (PI, RP), Chief Executive Officer at ecfirstWHERE CYBERSECURITY STARTS Darren Guccione, Co-Founder & CEOCOVER STORY Keeper takes only minutes to deploy, requires minimal ongoing management, and scales to meet the cybsersecurity needs of any size organization P reventing unauthorized access is a major challenge for many companies looking to protect their valuable data. In most cases, passwords play a critical role in maintaining system security and data protection. However, many companies consider it as their biggest struggle to secure their employees’ passwords. Over 80% of data breaches, and about 75% of ransomware attacks, involve compromised login credentials. Keeper Security—creators of the leading cybersecurity platform for preventing password-related data breaches and cyberthreats—solves this problem by giving IT administrators complete visibility into employee password practices. As a result, administrators can monitor the adoption of password requirements and enforce password security policies organization-wide, including strong, unique passwords and multi-factor authentication (2FA). The solution’s fine- grained access controls allow administrators to set employee permissions based on their roles and responsibilities, as well as set up shared folders for individual groups, such as job classifications or project teams. Craig Lurey Co-Founder & CTONext >