How to develop cyber risk mitigation strategy?

How to develop cyber risk mitigation strategy?

If you have been following this post series welcome back and thank you for your support.Hopefully, you have a change to complete the Business Impact Assessment (BIA)exercise and you have recognized the critical systems, critical network, andcritical data of your...
How to identify business critical systems?

How to identify business critical systems?

If you are a returning viewer, welcome back to the 2nd posts of this month and thank you for your support. For this week, let’s have a look on business critical systems. There are three critical systems:1. Mission critical systemsThese are the systems that are...
How Do I Know My Regulatory Requirements

How Do I Know My Regulatory Requirements

In reality, while rules and requirements about how to handle data don’t automatically make your data safe, they’re necessary. What’s needed can vary depending on the type of work you do, where you are, and how your organization is set up. If your...